Nearly one year to the day since the Colonial Pipeline ransomware attack, U.S. officials say that cybersecurity coordination between the federal government and critical infrastructure is much improved, but departments and agencies are still working through how to coordinate their regulatory pushes with other stakeholders in and out of government.The attack on Colonial Pipeline’s IT network by the DarkSide ransomware group last year, which pushed company officials to temporarily shut down operations, was followed in quick succession by ransomware attacks against major food supplier JBS and IT management software company Kaseya and thousands of its customers. Those events underscored how even discrete hacks of individual strategic infrastructure can cause broad disruption throughout the global supply chain. It also spurred the Biden administration and policymakers in Congress to take a much harder line when it came to regulating the cybersecurity of critical infrastructure entities.“I think there were many [people] that were surprised by the fact that a ransomware attack on an IT system could result in the total shutdown of a major piece of infrastructure,” said Jason Tama, director of resilience and response at the National Security Council, said Wednesday at Hack the Capitol, a cybersecurity policy conference focused on industrial control systems.That, in turn, led to new federal regulations last year touching a number of critical infrastructure sectors, including pipeline owners and operators, as well as the water and wastewater industries. But those requirements (which include mandates for companies to report hacks to the government and set up and test their own incident response plans) have come under criticism from some stakeholders who say they do not take into account the operational or technical realities of their individual sector and may hinder their ability to keep services up and running.Others have argued that certain critical infrastructure entities, particularly smaller companies, face more basic resource, training and workforce challenges and need help, not fines or regulatory punishment, to address them. “No amount of regulation will help if a water system operator is unaware of the importance of basic cyber hygiene,” Steve Mustard, an ICS security consultant and board member for the Mission Critical Global Alliance, wrote this past February. “Furthermore, regulations place another burden on an already thinly stretched workforce. Regulation without training or support is not only ineffective, but it also distracts from addressing the real issues affecting a public water system.”
Critical Infrastructure Security, Threat Management, Security Strategy, Plan, Budget, Ransomware
Stakeholder coordination still needs improvement a year after Colonial Pipeline attack

The attack on Colonial Pipeline’s IT network underscored how even discrete hacks of individual strategic assets can cause broad disruption. Pictured: The White House and Washington Monument are seen April 30 in Washington. (Photo by Samuel Corum/Getty Images)
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds



