This week marks 100 days since @POTUS & @VP took office. We’re looking back at the work we contributed during the first #100Days of the new @WhiteHouse administration.
@POTUS@VP@WhiteHouse Cybersecurity is a top priority for this administration. We've been helping public and private stakeholders protect their networks.
We issued two Emergency Directives and continue to help agencies and organizations detect, mitigate, remediate, and evict threat actors. #100Days
@POTUS@VP@WhiteHouse Our Computer Emergency Readiness Team - @USCERT_gov – continues to provide timely direction on Microsoft Exchange and Pulse Connect Secure vulnerabilities to federal civilian agencies and recommended urgent actions for public and private sector partners. #100Days
CISA Insights address cyber & physical threats to our nation’s critical infrastructure and provide mitigation activities that non-federal partners can implement.
As #COVID19 continues to impact the nation, so does our work to protect critical infrastructure. We helped with the COVID supply chain, misinformation & disinformation, vaccine hesitancy, and more. View our COVID-19 work: cisa.gov/coronavirus#100Days#ShotsInArms
As our nation begins to reopen, public gatherings are increasing. Bad actors can take advantage of these gatherings and our communities and businesses need to be ready. That’s why we created the new webpage, Securing Public Gatherings: cisa.gov/securing-publi…#100Days
We recognize that insider threats can be difficult to mitigate. Check out our Insider Threat Guide and learn best practices on how to prepare your organization for risks to critical infrastructure: cisa.gov/insider-threat…#100Days
We offer programs, tools, and resources to help keep our nation’s infrastructure secure. This includes routinely adding up-to-date, actionable content for stakeholders. View our training opportunities: cisa.gov/cisa-training#100Days
Sporting events remain a favorite pastime for fans to reconnect and build community pride. #Drones present a potential risk to fans, players, and staff in attendance. We released a fact sheet to help venue owners keep fans safe: cisa.gov/publication/un…#100Days
The compromise of a Florida water treatment facility earlier this year highlighted the vulnerabilities in critical infrastructure. We worked with @FBI, @EPA, and @CISecurity to issue a joint Cybersecurity Advisory: go.usa.gov/xsr4T#100Days
We also developed the Cybersecurity and Physical Security Convergence Guide which helps improve security through a comprehensive approach in managing cyber and physical risk: cisa.gov/cybersecurity-…#100Days
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Ever wanted to work at CISA? It’s #HotHiringSpring, & we’re filling hundreds of new roles. While there are too many cool roles to list, here are a few that we’re excited about! Note—different roles may share the same job posting link. Applications close 03/22, so apply ASAP. 🧵
We’re hiring a Tech Strategy Branch Chief to lead the team responsible for tech modernization in our Cybersecurity Division. Ideal candidates have experience leading tech teams and architecting tech projects. Interested? Apply here: usajobs.gov/job/711355500
We’re hiring a Future Tech Branch Chief to lead the team responsible for future and emerging security threats and vulnerabilities. Interested? Apply here: usajobs.gov/job/711355500
It’s our birthday! #CISAgov was established on November 16, 2018. From elections to COVID-19 to natural disasters and more, year two has been action-packed. Let’s take a trip down memory lane…
One key insight was in in January when we warned partners about potential Iranian retaliation against U.S. organizations—and advised them on how to assess and strengthen their physical & cyber security. This is the kind of rapid information-sharing we aim for! #InfoSecurity
Some facilities have already been infected with ransomware over the last week. Here’s what we know. (1/4)
Since 2016, the cybercriminal enterprise behind #Trickbot, #Ryuk, and other ransomware tools have continued to develop new functionality and tools increasing the ease, speed, and profitability of victimization. (2/4)
What began as a banking trojan and descendant of #Dyre malware, now provides its operators a full suite of tools to conduct a myriad of illegal cyber activities. (3/4)