House Of Reps Passes ICS Cybersecurity Training Act

House Of Reps Passes ICS Cybersecurity Training Act

In a predominantly bipartisan vote, the Industrial Control Systems Cybersecurity Training Act was passed by the House of Representatives on the evening of June 21, 2022. The bill, sponsored by Representative Eric Swalwell (D-CA) establishes within the Cybersecurity and Infrastructure Security Agency (CISA) an initiative to provide the cybersecurity workforce with no-cost training related to securing industrial control systems. These information systems are used to control industrial processes such as manufacturing, product handling, production and distribution.

Industrial Control Systems Cybersecurity Training Act

This bill will supplement an already impressive array of training programs from CISA to keep the infrastructure of the United States secure. Unlike a great many bills, the action elements are concise and precise..

CISA must ensure its efforts include:

  1. Virtual and in-person training and courses provided at no cost to participants;
  2. Training and courses available for different skill levels, including introductory-level courses;
  3. Training and courses that cover cybersecurity defense strategies for industrial control systems, including an understanding of the unique cybersecurity threats facing industrial control systems and the mitigation of security vulnerabilities in industrial control systems technology and
  4. Appropriate consideration regarding the availability of training and courses in different regions of the United States.

CISA must also ensure “collaboration with the Department of Energy’s National Laboratories; Consultation with Sector Risk Management Agencies; and as appropriate, consultation with private sector entities with relevant expertise, such as vendors of industrial control systems technologies,” according to the text of the bill.

CISA will report to both houses of Congress’ Homeland Security Committees on an annual basis providing Congress with a report on this training initiative. Specifically, CISA must include:

  1. A description of the courses provided under the initiative.
  2. A description of the outreach efforts to raise awareness of the availability of such courses.
  3. Information on the number and demographics of participants in such courses, including by gender, race and place of residence.
  4. Information on the participation in such courses of workers from each critical infrastructure sector.
  5. Plans for expanding access to industrial control systems education and training, including expanding access to women and underrepresented populations and expanding access to different regions of the United States.
  6. Recommendations on how to strengthen the state of industrial control systems cybersecurity education and training.
Recommended:  High-severity vulnerability in GitHub was susceptible to Repo Jacking

The Act has now been referred to the Senate Homeland Security and Governmental Affairs Committee for their action.

CISA’s Current Training Initiatives and Advisory Board Recommendations

CISA’s current array of training and learning programs, all of which are available at no cost to the participant, are available via the CISA.gov website and are divided into two sub-groups: The Critical Infrastructure Learning Series and The Critical Infrastructure Training Program.

Additionally, on June 22, included in CISA’s third cybersecurity advisory committee meeting readout were the reports from the various subcommittees, all of which were focused on the protection of the nation’s infrastructure.

  1. The Transforming the Cyber Workforce Subcommittee made recommendations focused on enhancing the talent acquisition process so as to make CISA more competitive and to create a new position within CISA, that of chief people officer.
  2. The Turning the Corner on Cyber Hygiene Subcommittee made three recommendations:
    1. CISA should launch a 311 national campaign to provide an emergency call line and clinics for assistance following cybersecurity incidents for small and medium businesses.
    2. CISA should expand its multifactor authentication (MFA) campaign by identifying additional vehicles for publicizing its More Than a Password campaign
    3. CISA should take all available steps to ensure that companies are working with the federal government to fully adopt MFA by 2025.
  3. The Protecting Critical Infrastructure from Mis- Dis- and Malinformation (MDM) Subcommittee recommended that CISA focus on addressing MDM risks that undermine critical functions of American society. As part of this work, the subcommittee recommended that CISA invest in external research to assess the impact of MDM threats and the efficacy of its MDM mitigation efforts.
  4. The Building Resilience and Reducing Systemic Risk to Critical Infrastructure Subcommittee continued its efforts to identify systemic risks across the national critical infrastructure and recommended holding tabletop exercises.
  5. The Strategic Communications Subcommittee echoed the recommendations from the Cyber Hygiene subcommittee with respect to MFA and a national 311 national campaign.
  6. The Technical Advisory Council recommended CISA develop incentives and access to information to aid security researchers and to invest in infrastructure to enable the timely submission and notification when vulnerabilities are discovered. The end goal is to create a complete loop system from submission to action to providing feedback to the researcher.
Recommended:  Buy an SSD while they're still cheap: Contamination ruins 6.5 billion GBs

source

Suggest an edit to this article

Go to Cybersecurity Knowledge Base

Got to the Latest Cybersecurity News

Go to Cybersecurity Academy

Go to Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
RiSec.n0tst3
Connect
Latest posts by RiSec.n0tst3 (see all)
Recommended:  Beware of the black cat ransomware: Dangerous and on the prowl
Share the word, let's increase Cybersecurity Awareness as we know it

Leave a Comment

Your email address will not be published. Required fields are marked *

RiSec Captcha 6 + 2 =