Congress is no stranger to cybersecurity laws; it’s just a
stranger to writing them correctly. Currently there is a new bill designed to
promote cybersecurity training for congressional staffers. That’s the good
news. The bad news is that it is doomed to fail for all the same reasons most
corporate training fails.If those who write cybersecurity bills would spend a few minutes listening to industry experts in the training industry, they would learn that effective cybersecurity training requires first the unlearning of “good habits” like holding doors open for strangers or responding quickly for requests to help. Instead, cybersecurity training says the person being asked to do the “good deed” must first ensure that the asker has the right to make the request and can be authenticated by the corporate security system.H.
Res. 355 calls for annual cybersecurity training that likely will include
everything from phishing and social engineering to business email compromises
and cybersecurity hygiene. Will it include all the nuanced training employees
need to know not to be tricked into launching malware or being subject to a
social engineering attack? Of course not; you can’t do all of that in a single,
annual session.The bill, sponsored by Rep. Kathleen Rice, D-NY, and Rep.
John Katko, R-NY, includes the following changes to Clause 4 of Rule II of the
Rules of the House of Representatives:1. The Chief Administrative Officer shall carry out an annual (emphasis added) information
security training program for Members (including the Delegates and Resident
Commissioner), officers, and employees of the House.2. A new Member, Delegate, Resident
Commissioner, officer, or employee of the House shall receive training under
this paragraph not later than 30 days after beginning service to the House.3. Not later than January 31 of each
year, each officer and employee of the House shall file a certification with
the Chief Administrative Officer that the officer or employee completed an
information security training program as established by this paragraph.These are lofty goals but frankly, annual training just
doesn’t work. Training needs to be ongoing, engaging and sometimes, completely
unexpected. Training needs to reach the staff on a personal level, making
security part of their daily experience. Instead of planning out on-going
training, tied to regular antiphishing exercises and red team tests to ensure
users are learning, we get a watered-down training session that, like so much
else Congress does, makes noise but no difference.In today’s polarized political environment, this is not
surprising. Likely a lot of people are scared that training exercises will be
used for political advantage by whichever party is in power. If we cannot trust
our Congressional IT staff enough to be free from politics and train our
Congressional employees correctly to protect the nation from nation-state
interference and general social engineering mayhem, how can we trust anyone to
protect the nation? Alas, the Congressional
Cybersecurity Training Resolution of 2019 is doomed to fail, and that is disappointing.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds



