Advertisement

Where Cars and Cybersecurity Collide (Pun Intended)

In this Op-Ed, Palo Alto Networks' Eric Trexler explains how federal cyber teams can learn from the simplicity of Rivian electric vehicles.
Listen to this article
0:00
Learn more. This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment.
A Rivian truck recharges at a Rivian electric vehicle (EV) charging station during a snowstorm on March 3, 2024 in Truckee, California. (Photo by Mario Tama/Getty Images)

A few years back, I was in the market for a new car. As I looked, I realized the features I love most — technology and performance capabilities — are not easily found together in the automotive industry.  Most vehicles are generations behind the electronics in our pockets when released, then rapidly outdated as time progresses. 

Ultimately, I went with a Rivian: a new, USA-made, adventure-focused EV company with a  consolidated approach to vehicle software. Unlike other manufacturers, each part of a Rivian  connects to a central processor through just two wires, reducing the number of components that  can break or fail, and reducing the cost to maintain. This approach allows Rivian to easily combine  capabilities to deliver integrated functions. So when you approach the car, it unlocks the doors,  starts the HVAC system, powers on the lights and audio system, and adjusts the seat.  

Rivian’s approach got me thinking about the parallels to the cybersecurity industry. Today, many vendors create capabilities to solve a single or small set of problems and the customer is left to  integrate the systems themselves, rarely, if ever, achieving automated system operations. Most networks run as a sum of their parts, but security leaders can achieve greater visibility and  simplified operations by taking a page from the Rivian playbook and embracing platformization to  best defend against threats targeting mission-critical operations.  

Just as most cars have 70-100+ components to control internal systems, most federal agencies’ security  landscapes are dependent on a mess of disparate solutions, often 70+, each with unique  vulnerabilities and opportunities for exploitation. That’s because leaders often opt for “best-of breed” point products that require individual monitoring and patching. However, the lack of  visibility between departments and solutions only furthers segmentation.  

Advertisement

This inability to monitor for potential points of attack can be devastating to an organization’s  security. If a gap exists, bad actors will exploit it. Over 23% of data exposures involve critical IT and  security infrastructure, suggesting threat actors are adapting their methods to identify and take  advantage of common holes left in piecemeal security architecture. They understand disconnected  architecture is hard to defend, and therefore easy to infiltrate. 

Public sector as a case study 

Government organizations are heavily siloed, and as a result their IT landscapes are too. This  challenges visibility across the whole organization and can create holes in the attack surface for  threat actors to penetrate. Despite this, public sector IT teams have trailed their industry  counterparts in creating holistic approaches to cybersecurity. 

This is concerning, as government agencies in particular are often prime targets for threat actors  given their access to high-value information and systems that malicious actors target through  malware, ransomware, and DDoS attacks. In more extreme cases, agencies have been the target  of cyberespionage attacks from nation-state threat actors, especially in tense times like major  elections. These types of attacks are made easier by larger attack surfaces and disjointed  operations. 

Best practices for public sector platformization implementation  

Advertisement

The first step in implementing a simplified approach to cybersecurity is to take stock of the  solutions currently deployed within the IT landscape. An optimized cybersecurity approach will  focus on agency outcomes, not products or merely compliance activities. All security leaders, no  matter the industry, need to take holistic and routine assessments of their technology stacks to  identify siloes and redundancies. From there, you can make decisions about what can be  streamlined and consolidated, and where new investments are needed. A good place to start is  with automation; anything that can be automated should be automated, with the end goal being  full autonomy to the greatest extent possible. 

Next, eliminate any single-use solutions unless absolutely necessary. Vendors should have the  capability to integrate with other solutions and orchestrate multiple applications. When it comes to  IT teams, work to see whether current processes can be done in fewer steps to remove  unnecessary middlemen.  

The final step is communication. Share your goals and reasoning for simplification with your board  and educate employees about the importance of sticking to pre-approved solutions. The IT team  alone cannot be expected to protect what they can’t see, so encouraging a transparent culture is  paramount. Everyone — regardless of their role — must understand that when it comes to security,  less is more.  

Bottom line: keeping it simple keeps us safe, whether on the roads or in our security infrastructure.  Just as Rivian decided to simplify and integrate technology, we too can take similar disruptive steps  in the security industry. Threat actors get more sophisticated, unified architecture will be key in  mitigating threats to critical missions and keeping your agency’s valuable data safe from  adversaries. Rivians are better today than the day they are purchased, shouldn’t our cyber security  solutions adopt the same mindset?

Latest Podcasts