Back in December, we provided coverage and analysis of the first meeting of the Cybersecurity & Infrastructure Security Administration (CISA) Advisory Committee. We noted then that CISA Director Jen Easterly and Def Con Founder Jeff Moss (a CISA Advisory Committee Member) at the meeting were less concerned with collaboration with the business community and, instead, prioritized messaging and outreach to the hacker and research community.
The Russian Invasion of Ukraine has now changed everything in this calculus of how best to “ignite” and perform outreach to the community. Here’s how.
Many OODA Loop members have had their nose to the grindstone right through the holiday season attending to the potential impacts of the Log4j and Log4Shell vulnerabilities within their organization. Following is a ‘big picture’ update of CISA press releases, global incidents, and impacts for your review when you come up for air and need to assess more of the strategic challenge ahead with the vulnerability.
A Call to Action from CISA’s Jen Easterly and Def Con’s Jeff Moss at Inaugural CISA Advisory Committee Mtg.
In the first meeting of the Cybersecurity and Infrastructure Security Agency’s (CISA) new Cybersecurity Advisory Committee, CISA Director Jen Easterly made clear to the committee members their working model would be action-based, not the usual passive mode assumed by an advisory body, telling the group: “I welcome this group creating action. This is really just not about being a talking club. This is about leveraging your expertise, your perspective, to make the nation safer.” Advisory Committee Member, Def Con Founder Jeff Moss, also offered his perspective on how best to engage the hacker community.