AST July 2022 PREVIEW Final 2022 'ASTORS' PREVIEW EDITION | Page 33

as phishing attacks , the spill- ing of classified information , or malware infections on a sin- gle machine .

www . AmericanSecurityToday . com July 2022 - Edition 62

Due to the limited scope of the playbooks , security and risk leaders must be proactive .

They can t wait for a major in- cident to occur and should im- plement workable models for detecting and responding to all cybersecurity vulnerabili- ties and incidents .

Additionally , to be truly effec- tive , the CISA playbooks must be adopted , tested , and ex- ercised , so everyone in the or- ganization knows their roles and responsibilities including non-cyber security personnel and leaders .

They must also evolve to keep pace with emerging risks as threat actors circumvent new procedures and tools .

3 . Improving investigative and remediation capabili- ties

Maximizing the early detec- tion of cybersecurity vulnera- bilities and incidents on federal networks is a crucial priority of the Administration . But as fed- eral IT infrastructure expands into the cloud and remote en- vironments , discovering vul- nerabilities is a daunting and time-consuming process .

Not only are environments in- creasingly complex , but so are the tools needed to monitor them .

A quarter of respondents to the SolarWinds survey said the

33