as phishing attacks , the “ spill- ing ” of classified information , or malware infections on a sin- gle machine .
www . AmericanSecurityToday . com July 2022 - Edition 62
Due to the limited scope of the playbooks , security and risk leaders must be proactive .
They can ’ t wait for a major in- cident to occur and should im- plement workable models for detecting and responding to all cybersecurity vulnerabili- ties and incidents .
Additionally , to be truly effec- tive , the CISA playbooks must be adopted , tested , and ex- ercised , so everyone in the or- ganization knows their roles and responsibilities – including non-cyber security personnel and leaders .
They must also evolve to keep pace with emerging risks as threat actors circumvent new procedures and tools .
3 . Improving investigative and remediation capabili- ties
Maximizing the early detec- tion of cybersecurity vulnera- bilities and incidents on federal networks is a crucial priority of the Administration . But as fed- eral IT infrastructure expands into the cloud and remote en- vironments , discovering vul- nerabilities is a daunting and time-consuming process .
Not only are environments in- creasingly complex , but so are the tools needed to monitor them .
A quarter of respondents to the SolarWinds survey said the
33