国产视频

Background

In 2023, over 880,000 cyber crimes in the U.S. resulted in around $12.5 billion in losses, according to the FBI鈥檚 Internet Crimes Complaint Report.1 Ransomware attacks alone directly impacted at least 2,200 hospitals, schools, and governments across the U.S. that year.2 Those estimates almost certainly undercount the problem鈥檚 scope because it is likely that a number of cybersecurity incidents go unreported. In addition to financially motivated crimes, politically motivated cyber attacks also represent significant concerns. In early 2024, the Cybersecurity and Infrastructure Security Agency (CISA) reported that a foreign state-sponsored cyber actor was discovered to have maintained access to critical infrastructure systems across the U.S., in some cases, for as long as five years.3

While the cyber threat landscape continues to evolve rapidly, the number of cybersecurity professionals needed to defend against those threats has not kept pace. In mid-2024, cybersecurity job openings numbered around 470,000.4 By one estimate, the U.S. would need to train 40 percent of all people entering the workforce in cybersecurity over the next seven years to meet the growing cyber workforce gap.5 However, efforts to increase the size of the cybersecurity workforce, even if successful, are unlikely to be sufficient to meet that goal. In a 2023 congressional hearing, Representative Mike Gallagher (R-W.I.) remarked, 鈥淪ince 2013鈥 we have tried to address the civilian and military cyber workforce dilemma 45 times鈥 And the country鈥檚 collective capabilities and readiness are, seemingly, no better off because of it.鈥6 In addition to the cybersecurity workforce shortage, software developers continue to develop insecure software, increasing the burden and potential vulnerability of under-resourced organizations who utilize the software.7 In 2023, nearly 29,000 common vulnerabilities and exploits (CVEs), which are weaknesses in software that can be exploited, were recorded.8

鈥淏y one estimate, the U.S. would need to train 40 percent of all people entering the workforce in cybersecurity over the next seven years to meet the growing cyber workforce gap.鈥

In the United States, those under-resourced organizations are often state, local, tribal, and territorial governments (SLTTs) and small- and medium-sized businesses (SMBs), which operate much of the country鈥檚 critical infrastructure and provide many essential services. For example, according to CISA, there are 鈥渁pproximately 153,000 public drinking water systems and more than 16,000 publicly owned wastewater treatment systems in the United States.鈥9 SLTTs and SMBs must navigate the same cyber threat landscape as the federal government and global corporations, but with far fewer resources.10 According to a 2023 report from NetDiligence, the average cost of cyber incidents for SMBs in the five years leading up to 2023 (excluding business interruption and certain other costs) was over $1 million.11

Examples from recent years highlight the total costs of cybersecurity incidents. For instance, a 2018 ransomware attack on the City of Atlanta, Georgia, resulted in costs estimated to be around $17 million.12 A 2019 ransomware attack on the City of Baltimore, Maryland, cost taxpayers over $18 million,13 and a 2022 ransomware attack on Suffolk County, New York, resulted in costs estimated as high as $25 million.14 More recently, a 2023 ransomware attack on Dallas County, Texas, resulted in around $8.6 million in costs for recovery efforts, including the purchase and installation of new devices and equipment; temporary staff; credit monitoring and identity theft protection services; call center support; forensic accounting; application and system recovery; and software licenses.15

In the private sector, according to one survey, 60 percent of companies go out of business within six months of a significant cyber attack.16 The same study notes that 30 percent of SMBs do not have a written information security incident response plan; 21 percent of SMBs do not have backup copies of data sufficient to restore systems following a cyber attack; and only 28 percent would survive beyond seven days after a ransomware attack taking their operations offline.17

To date, the U.S. has not taken adequate measures to defend SLTTs and SMBs against cyber attacks. However, a cyber volunteer ecosystem is emerging to fill the gap. In some states, universities have established cybersecurity clinics where professors and students work to improve the cyber resiliency of SLTTs and SMBs and train the next generation of cybersecurity professionals.18 Across the U.S., nonprofit organizations, like the Cyber Peace Institute and, recently, DEFCON鈥檚 Project Franklin, have created opportunities for cybersecurity professionals to volunteer to assist beneficiaries with cybersecurity needs.19

Government entities have also taken action. At the federal level, the U.S. Marine Corps established a Cyber Auxiliary to provide education and training to the Marine Corps. Meanwhile, state governments have established volunteer civilian cyber corps (C3s) to improve the resiliency of SLTT entities within their borders. Maryland, Michigan, Wisconsin, Ohio, and Texas have formed C3s to provide cybersecurity services to beneficiaries. Other states are considering this option as a replicable and scalable solution to help address cyber workforce challenges, improve cyber resiliency, and develop cyber emergency response capabilities accessible to local entities. Outside the United States, countries such as Estonia, Sweden, Switzerland, and others already take a whole-of-society approach to cybersecurity and utilize civilian cyber volunteers.

Citations
  1. FBI, Internet Crimes Complaint Report 2023 (Washington, DC: FBI, 2023), 3, .
  2. Emsisoft Malware Lab, The State of Ransomware in the U.S.: Report and Statistics 2023 (Emsisoft: 2024), .
  3. Cybersecurity and Infrastructure Security Agency, PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure (Washington, DC: Cybersecurity & Infrastructure Security Agency, 2024), .
  4. Cyber Seek, 鈥淐ybersecurity Supply/Demand Heat Map,鈥 .
  5. Nick Merrill, 鈥淭he Cybersecurity Workforce Has an Immigration Problem,鈥 Tech Policy Press, August 9, 2024, .
  6. Mike Gallagher, 鈥淐yberspace Operations: Conflict in the 21st Century,鈥 Hearing before the House Armed Services Committee, Cyber, Information Technologies, and Innovation Subcommittee, March 30, 2023, 23:19, .
  7. See Christian Vasquez, 鈥淓asterly: Cybersecurity Is a Software Quality Problem鈥 CyberScoop, August 9, 2024, .
  8. CVE, 鈥淢etrics: Published CVE Records,鈥 .
  9. 鈥淲ater & Wastewater Systems,鈥 CISA, accessed August 25, 2024, .
  10. Natasha Cohen and Peter Warren Singer, The Need for C3: A Proposal for a United States Cybersecurity Civilian Corps (Washington, DC: 国产视频, 2018), source.
  11. NetDiligence, Cyber Claims Study 2023 Report (NetDiligence, 2024), 17, .
  12. Stephen Deere, 鈥淐onfidential Report: Atlanta鈥檚 Cyber Attack Could Cost Taxpayers $17 Million,鈥 Atlanta Journal-Constitution, August 1, 2018, .
  13. Adam Bednar, 鈥淐ost of Baltimore Ransomware Attack So Far: $18 Million,鈥 Daily Record, June 4, 2019, .
  14. Alan J., 鈥淩ansomware Recovery Effort Cost Suffolk County $25.7 Million, Prompting Investigation,鈥 Cyber Express, July 22, 2024, .
  15. 鈥淒ata Security Breach Reports,鈥 Attorney General of Texas, accessed Aug. 19, 2024, .
  16. Joe Galvin, 鈥60 Percent of Small Businesses Fold within 6 Months of a Cyber Attack. Here鈥檚 How to Protect Yourself,鈥 Inc. Magazine, May 7, 2018, .
  17. Cybercatch, 鈥淪mall- and Medium-Sized Businesses Ransomware Survey 2022,鈥 (Cybercatch, 2022), 3, .
  18. 鈥淲hat is a Clinic?,鈥 Consortium of Cybersecurity Clinics, accessed August 16, 2024, .
  19. See 鈥淐ybersecurity for Social Impact,鈥 CyberPeace Builders, accessed August 16, 2024, ; and see Jake Braun, 鈥淒EF CON 32 – Jake Braun – DEF CON Franklin Project,鈥 August 10, 2024, YouTube (video), .

Table of Contents

Close