Skip to content
    Search
    Request A Free Trial

    What you'll hear:

    • The tools required to address the modern challenges faced by federal agencies.
    • Organizations need to integrate and correlate data from various sources.
    • The value of closely monitoring trends and promptly addressing gaps in real time.

    The below originally appeared on the FedScoop

    This video panel discussion was produced by Scoop News Group for FedScoop and underwritten by Axonius.

    Continuous and comprehensive asset visibility is essential to manage cybersecurity risk effectively. That’s the premise behind the Cybersecurity and Infrastructure Security Agency’s Binding Operational Directive 23-01 (BOD-2301). This binding directive tasks federal agencies to achieve two core activities regularly: one involves asset discovery. The other consists of identifying and reporting vulnerabilities associated with those assets.

    Michael Duffy, associate director for the cybersecurity division at CISA and Axonius CEO Dean Sysman joined FedScoop for an interview on what agencies must do, their progress, and recommendations on managing those efforts.

    Duffy discussed the background and significance of BOD-2301. He explained that CISA’s continuous diagnostics and mitigation (CDM) program was established over a decade ago to provide agencies with consistent and cost-effective cybersecurity solutions. The primary focus of CDM was to enhance cybersecurity through tools, technology and integration. Asset management, a part of phase one, was important but was not previously a definitive policy requirement.

    The shift towards the BOD was prompted by significant cybersecurity events in 2021, demonstrating the critical need for improved asset visibility and vulnerability management.

    “We’ve seen agencies making significant progress; those already trending in the right direction based on their CDM deployments have harnessed that capability. We found that over 90% of federal agencies are meeting key thresholds within that directive, which sets us up at CISA to be able to effectively support agencies as they are locating vulnerabilities, especially those known exploited vulnerabilities on their networks in their enterprise, to make sure that we can remediate them quickly before an attacker can exploit those vulnerabilities,” said Duffy.

    Sysman highlighted the evolution of asset management and the tools required to address the modern challenges faced by federal agencies. Traditionally, asset management has been approached through three main methods: network-based scanning, agent-based solutions and manual data input into CMDBs. In today’s dynamic environments, these traditional approaches are no longer sufficient.

    Sysman drew an analogy to a puzzle, emphasizing that to gain a complete understanding of assets, organizations need to integrate and correlate data from various sources. Each source, whether network controls, agents, identity controls or cloud platforms, provides a piece of the puzzle about an asset.

    “It starts with understanding what those assets are, what are the vulnerabilities they have. And even more importantly, the business context of that asset,” said Sysman.

    Duffy and Sysman agreed on the critical significance of striving for a 100% asset visibility goal. They stressed how data integration could prove advantageous in multiple cybersecurity areas, extending beyond asset management, including vulnerability management, risk reduction and decision-making. They also emphasized the value of closely monitoring trends and promptly addressing gaps in real time, underscoring its pivotal role in effectively addressing contemporary cybersecurity challenges.

    Learn more about the power of getting full access and visibility into your organization’s assets and managing those accordingly.

    Sign up to get first access to our latest resources

    Recent Posts

    View All Posts →
    Idaho National Laboratory’s CISO/CDO Discusses How to Balance Meeting Federal Mandates and Building a Strong Cybersecurity Posture
    Cybersecurity Asset Management

    Idaho National Laboratory’s CISO/CDO Discusses How to Balance Meeting Federal Mandates and Building a Strong Cybersecurity Posture

    While cybersecurity is a monumental challenge for all federal agencies, it becomes even more...

    Eight Questions to Ask Before Buying a New IT or Security Solution
    Cybersecurity Asset Management

    Eight Questions to Ask Before Buying a New IT or Security Solution

    When choosing new software products or solutions for your organization, complexity is inevitable....

    Cybersecurity Burnout and the Rising Importance of Cyberpsychology
    Cybersecurity Asset Management

    Cybersecurity Burnout and the Rising Importance of Cyberpsychology

    Over the last few years, dialogue about burnout in cybersecurity has increased – and for good...

    How to Optimize Your Tools, Processes, and People to Recover from an Incident Quickly
    Incident Response

    How to Optimize Your Tools, Processes, and People to Recover from an Incident Quickly

    At the beginning of this year, we predicted optimization would be a top priority for IT and...