How the newest ISAC aims to help food and agriculture firms thwart cyberattacks

How the newest ISAC aims to help food and agriculture firms thwart cyberattacks

This audio is auto-generated. Please let us know if you have feedback.

As food and agriculture companies increasingly enter the crosshairs of government-backed hackers, with everything from animal health to crop innovation on the line, the sector’s new cybersecurity collaboration group has had to grow fast.

For many years, cyberattacks were low on the food industry’s priority list. Executives focused on more obvious industry problems, like sickened cows and wheat spoilage. But eventually, ransomware attacks and nation-state espionage became too disruptive to ignore. In May 2023, major industry players including PepsiCo, Tyson Foods, Cargill and Conagra teamed up to form the Food and Agriculture Information Sharing and Analysis Center, filling a void that experts had described as uniquely dangerous.

Two years into the food ISAC’s work, the organization finds itself busier than ever, as it helps companies protect the U.S. food supply from cyberattacks that could have devastating consequences for the food supply chain. Victims in the sector have included Dole, Mondelēz, Sysco and United Natural Foods, as well as dairy giant HP Hood, which had to shut down manufacturing plants after a 2022 breach.

“There’s a lot of attention being paid to cybersecurity now within the industry,” Scott Algeier, the executive director of the food ISAC, told Cybersecurity Dive. “There’s a lot of issues that grab people’s attention in this space, and in the past, I think cybersecurity hasn’t always risen to the top. We’re seeing that change.”

Uniting the sector

When the food ISAC launched, it wasn’t starting from scratch. Food and agriculture companies were already exchanging cyber threat information and receiving security services through a “special interest group” inside of the information technology industry’s ISAC. Launching the standalone ISAC involved migrating those resources over to the new group without disrupting companies’ access to them. 

“We didn’t want to start with zero capabilities,” Algeier said. “They became … accustomed to having these robust capabilities … [and] the relationships that were developed with the technology providers.”

The new group also sought to differentiate itself from an earlier industry ISAC that launched in 2002 and shut down in 2008. That group failed because members were reluctant to share information with competitors and worried about the antitrust implications of doing so. But 15 years later, new legal protections from the federal government and the productive IT-ISAC experience convinced companies to try again. “They had these trust relationships [with each other] that were already established,” Algeier said, “and they had multiple years of success sharing with each other.”

Today, the ISAC is a hub of robust information-sharing between food and agriculture companies, according to Algeier. “We’re collecting better data,” he said. “Our member companies are actively sharing with us. … We have more accurate visibility into what’s going on in the sector, and we’re able to produce intelligence that reflects this.” Those improved insights have allowed the ISAC to update its cybersecurity guidance for small and medium-sized businesses with more specific information about adversary activity, such as attacks on remote monitoring and management tools. 

The group issues alerts about geopolitical conflicts, joins other ISACs in highlighting especially serious threat activity and partners with universities to improve research and development. It also publishes threat reports, including one in May that documented a surge in ransomware attacks on food and agriculture organizations.

FMI, a major food-industry trade group, has benefited from the ISAC’s “relevant, real-time insights that are both actionable and valuable,” said Doug Baker, the group’s vice president of industry relations. “When a threat emerges in one part of the supply chain,” Baker said, “they help us share that intelligence more broadly, enabling retailers and suppliers to anticipate and respond before disruptions escalate.”

Robert Norton, a biosecurity and national security expert at Auburn University, commended the ISAC’s work thus far and said he hoped it could eventually “fill long-standing gaps” in the sector’s resilience, including by adding smaller companies to its membership.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.