U.S. Government to Rank Security Threats


How important is ranking your security threats? We’ve long preached the gospel that finding a solution that prioritizes threats—while eliminating false positive through entity-encompassing analytics—has proven essential to stopping breaches.

In light of the recent DNC hack and other threats, the White House has now taken one stride towards that goal, ranking Federal and private incidents with a centralized threat-level scale. Says the White House: “When a cyber incident occurs, determining its potential severity is critical to ensuring the incident receives the appropriate level of attention. No two incidents are the same and, particularly at the initial stages, important information, including the nature of the perpetrator, may be unknown.”

President Obama has laid out this plan through The Presidential Policy Directive on United States Cyber Incident Coordination, with The Hill reporting that “the document has been largely met with support from the security industry and Capitol Hill.

According to The Verge, “The cyberattack severity scale is somewhat vague, but it’s supposed to make sure that the agencies involved in cybersecurity—the Department of Justice, Department of Homeland Security, and Office of the Director of National Intelligence—respond to threats with the same level of urgency and investment.”

Tactically, the “Cyber Incident Severity Schema” (see chart, above) not only accounts for an attack’s severity, it also considers the urgency in responding to it, the degree of seniority required to respond to it, and the amount of investment required to address it.