ASSOCIATE Magazine FBINAA Q4-2024
Continued from "Balancing Advanced Tech", on page 13
software levels. This inventory also allows for better assessment of the inherent risks associated with different IT products. • Vulnerability management: Once vulnerabilities are understood, hardening the most vulnerable points in an infrastructure mitigates risk. And as insight is gained and compliance issues are updated, regular firmware updates are implemented to ensure continued security and compliance. • Threat detection and response : Devices are validated that they have not been tampered with and have authentic components, securing the threat to supply chains. Advanced threat detection extends even to threats capable of evading EDR. The correct cybersecurity solutions assist agencies in re maining compliant and exercising best practices to ensure seam less device operation, extending device lifespan for cost savings, and provides insight into product vulnerabilities for smarter operational technology procurement decisions. REALIZE THE FULL POTENTIAL OF TECHNOLOGY As law enforcement agencies navigate the complexities of technology deployment, prioritizing cybersecurity and compli ance with industry standards is non-negotiable. Mobile com puting devices are an evolving and necessary tool for criminal justice agencies, but the right mobile devices must be deployed for the benefit of both the agencies and the citizens they serve. Using advanced rugged devices, cybersecurity tools and best practices, agencies can harness the full potential of technol ogy while effectively safeguarding against evolving and novel threats. Reducing cyberthreats to protected data and operation al technology through advanced security tools allows criminal justice agencies to focus on their mission-critical responsibilities of reducing crime and elevating community safety. Selecting the right technology partner is crucial in this endeavor, ensuring agencies have the support and expertise needed to stay ahead of threats and maintain the highest standards of security and efficiency.
destruction of CJI.”
Non-compliance with the CJISSECPOL can lead to unauthorized data access and loss, jeopardizing ongoing investigations and compromising sensitive information. Therefore, implementing innovative technology in accordance with these standards is vital for maintaining the integrity and security of law enforcement data and operations. THE ROLE OF MOBILE DEVICES IN MAINTAINING SECU RITY Deploying the right mobile devices with advanced security features is crucial for law enforcement agencies to maintain data security – for many reasons we’ve explored. Key mobile device features that agencies should look for include encryption, remote wipe capabilities, multi-factor authentication (MFA), hardware, software, and firmware integrity, as well as regular security patches. Encryption plays a vital role in protecting both stored and transmitted data on mobile devices. By encrypting data, agencies can prevent unauthorized use and ensure the confidentiality of sensitive information. Taking it a step further, in the event of a lost or stolen device, remote wipe capabilities simplify remotely erasing or freezing all data on the device, mitigating the risk of potential data loss and unauthorized access. A remote wipe command erases all data on a device, making it impossible to recover files. The capability may also provide options to remotely lock the device or remove it from the associated account. Geolocation of the missing device is also an essential feature which should be used by the criminal justice community. These features are essential for preventing unauthorized access to protected data. Public sector agencies should also look at modular or configurable devices so that they can maintain compliance and update both physical and digital security protocols and practices as the CJISSECPOL demands. Using MFA as an example, additional layers of security are added by requiring users to provide multiple forms of verification before they can gain access to the device or sensitive data. In the case of a modular computing device, accessories like fingerprint readers and smartcard readers can be added to physical devices to grant access for a specific person. This helps prevent unauthorized users from accessing sensitive information and data accessible through the device, even if the device is compromised. Hardware, software, and firmware integrity requirements were recently introduced into the CJISSECPOL. This appears to be a response to malicious actors adjusting their attacks to “below the operating system.” Agencies and organizations subject to the CJISSECPOL must now understand these potential threats and take mitigating steps to ensure device integrity. Understanding potential threats is only the beginning. Agencies are required to enhance their existing systems of critical security controls to protect devices against novel threats. Some best practices include: • Asset inventory: Building an extensive inventory of all IT infrastructure allows departments to easily check for unauthorized changes on the hardware, firmware, and
About the Author: Sean Georgia serves as Territory Ac count Manager for Professional Services (Public Sector) at Panasonic Connect North America. In this role, he serves the public sector by developing solutions to meet the unique needs of each first responder agency. Earlier in his career, he served for 26 years in the Penn sylvania State Police where he held leadership roles in addition to serving in policy development and imple mentation and managing the operational technology used daily by troopers. He most recently served as the Director of the Bureau of Communications and Infor mation Services, Pennsylvania’s CJIS Systems Agency Sean obtained his bachelor's degree from Misericordia University and his certificate of criminal justice from the University of Virginia and is a graduate of the FBI National Academy Session 265.
30 FBINAA.ORG | Q4 2024
Made with FlippingBook - Online magazine maker