For a short, but critical period of time last Wednesday, chaos reigned inside the U.S. Capitol building in Washington, D.C. Risk assessment failed. Sure, one day a mob could theoretically invade the building, but what are the chances? This legitimately remote possibility was assumed away and the long-term security posture designed for more likely threats. Reasonable enough, until a mob stormed the building.
Remediation has started. The response team will start with triage. Security pros will look for what’s obviously wrong: what systems were accessed, items taken, and spaces breached. Network defenders will conduct scans looking for problems. Classified systems and data will take priority.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.