A program manager at Lawrence Livermore National Laboratory told lawmakers Tuesday that the recent contract expiration puts OT security at risk.

Data from sensors that detect threats in critical infrastructure networks is sitting unanalyzed after a government contract expired this weekend, raising risks for operational technology, a program leader at Lawrence Livermore National Laboratory told lawmakers Tuesday.
That news arrived at a hearing of a House Homeland Security subcommittee on Stuxnet, the malware that was discovered 15 years ago after it afflicted Iranās nuclear centrifuges. The hearing focused on operational technology (OT), used to monitor and control physical processes in things like manufacturing or energy plants.
Amid a Department of Homeland Security review of contracts, the arrangement between the laboratory and DHSās Cybersecurity and Infrastructure Security Agency to support the CyberSentry program expired Sunday, the laboratory program manager Nathaniel Gleason told lawmakers under questioning Tuesday.
CyberSentry is a voluntary program for critical infrastructure owners and operators to monitor threats in both their IT and OT networks.
āWeāre looking for threats that havenāt been seen before,ā Gleason told California Rep. Eric Swalwell, the top Democrat on the Subcommittee on Cybersecurity and Infrastructure Protection. āWeāre looking for threats that exist right now in our infrastructure. One of the great things about the CyberSentry program is that it takes the research and marries it with what is actually happening on the real networks. So weāre not just doing science projects. Weāre deploying that technology out in the real world, detecting real threats.ā
But the lab canāt legally analyze the data from the CyberSentry sensors without funding from government agencies, and funding agreements were still making their way through DHS processes before the contract expired this weekend, he said.
āOne of the most important things is getting visibility into whatās happening on our OT networks,ā Gleason said. āWe donāt have enough of that. So losing this visibility through this program is a significant loss.ā
Spokespeople for the lab and CISA did not immediately provide further details on the size or length of the contract, and CISA did not immediately comment on what would be lost without the lab contract. Other threat hunting contracts have also expired under the Trump administration.
Tatyana Bolton, executive director of the Operational Technology Cyber Coalition, told the subcommittee there arenāt enough federal OT cybersecurity resources in general.
āWe must better resource OT security,ā Bolton said. āFrom addressing the growing tech debt, hiring cybersecurity experts, to procuring and building updated systems, OT owners and operators donāt have the necessary funding to defend their networks.ā
Those owners and operators spend 99 cents of every dollar on physical security and 1 cent on cybersecurity, she said. Reauthorizing the State and Local Cybersecurity Grant Program, due to expire in September, would help with that, Bolton said.
The Trump administration has made large cuts in CISAās budget since the president took office in January.
Latest Podcasts
Government
Technology