Smarter Gov Tech, Stronger MerITocracy

In a bipartisan effort, Harvard University’s Belfer Center for Science and International Affairs is looking to protect elections from cyberattacks and propaganda. The Cybersecurity Campaign Playbook, released today, gives campaign officials simple, actionable information to better secure campaign information from adversaries attempting to use cyberattacks. […]

With $5 billion in global revenue, Symantec is the 500 pound yellow gorilla in the cybersecurity business. Some dimensions on the beast: installed at every Federal cabinet-level agency; supports 350,000 customers; tracks 700,000 hackers; and leverages more than nine trillion elements of security data. Now, that’s a big monkey. […]

In the event of a cyberattack, it’s important for information about the attack to be shared with the public in order to prevent further problems. Jeanette Manfra, assistant secretary for the Office of Cybersecurity and Communications at the Department of Homeland Security, said that the agency shares timely, accurate information with its partners and constituents so that they can take proper action to protect themselves. […]

The May Cybersecurity Executive Order and the White House’s IT Modernization Report have encouraged agencies to look for ways to use shared services to improve cybersecurity. The Department of Justice has been looking into using shared services before the push from the White House, giving the agency a head start at shared services centered on cybersecurity for the enterprise. […]

The Justice Department has evidence to charge six Russian government officials for involvement in the hack of the Democratic National Committee. U.S. authorities are considering charging the Russian officials to make it difficult for them to travel, but they are unlikely to be arrested and prosecuted in the U.S. […]

Tanium, along with its partner World Wide Technology, received a potential five-year, $750 million contract from the Defense Innovation Unit Experimental (DIUx), the Defense Department’s Silicon Valley outfit, to provide managed cybersecurity services to Federal agencies. […]

The Department of Commerce has made strides to manage the IT costs and oversight of new systems before the 2020 Census, after reports of poor oversight and planning. A Government Accountability Office report, released in October, found that the Census Bureau faced challenges in managing and overseeing the IT programs, systems, and contracts supporting the 2020 Census. […]

The Continuous Diagnostics and Mitigation Program last week held its first data exchange between the Federal CDM dashboard and an agency dashboard. All of the CFO Federal agencies have agency dashboards to comply with the CDM program, and the Federal dashboard is in production. […]

The Department of Energy plans to roll out an enterprise risk management framework that would provide cybersecurity data about the agency in one place and enable better information sharing between departments.
“The enemy isn’t a hacker in the basement,” said Micah Czigan, director of the Integrated Joint Cybersecurity Coordination Center for DOE. “The enemy is a world power nation-state.” […]

Sen. Sheldon Whitehouse, D-R.I., said that he is concerned about the Trump administration’s widespread adoption of the NIST Cybersecurity Framework. “The NIST Framework has never been adequately validated,” he said, adding that he wonders whether agencies have accepted it because it’s effective or because “compliance demands so little effort.” […]

Representatives from Facebook, Twitter, and Google told Congress on Oct. 31 that they’ve had to learn how to combat nontraditional cyberattacks, like the spread of disinformation, rather than focusing on malware attacks alone to protect consumers. […]

Following a House hearing on the cyber workforce shortage, the Department of Homeland Security released information about cyber training programs. […]

Cybersecurity experts offered solutions to protect the U.S. electric grid, including moving the grid off of the public Internet, and using quantum encryption capabilities. “The nation’s electrical grid is a vital resource upon which our economy and our citizens’ daily lives depend,” said Richard Raines, director of the Electrical and Electronics Systems Research Division at Oak Ridge National Laboratory. “It is also a system that is highly vulnerable to cyber intrusions as more and more utility controls and ‘smart’ technologies rely on public Internet connections.” […]

Many Federal agencies still struggle with overcoming security concerns when transitioning to the cloud, according to a MeriTalk report, To Cloud or Not to Cloud? That Isn’t the Question. Thirty-five percent of Federal IT leaders said that the security of their existing private cloud environments is excellent, compared to 21 percent for public cloud security. […]

The Department of Homeland Security published tips on Staying Safe in a ‘Smart’ World, which tells citizens how to navigate an environment full of the Internet of Things. […]

Jeff T.H. Pon, the nominee for director of the Office of Personnel Management, said that his top priority for the agency will be IT modernization. “Outside of work, Federal employees are able to access nearly any piece of information they need, from their bank accounts to student loans to car insurance, all on their phone,” he said. “We need to work toward providing the employees of the Federal government with the same conveniences with regards to their employment within the Federal government, with appropriate attention to information security.” […]

SBA

Federal IT leaders are shifting focus from trying to secure every system to prioritizing the systems that need the most security controls. “We realized that no matter how much we protected our systems, something could happen,” said Thresa Lang, deputy director of the Navy Cybersecurity Division, at CISQ’s Cyber Resilience Summit on Oct. 19. […]

The Department of Homeland Security’s National Protection and Programs Directorate is standing up shared Continuous Diagnostics and Mitigation cloud security resources for small agencies. “That’s a rock star idea that’s coming to a government near you,” said Jeffrey Eisensmith, chief information security officer for DHS. […]

Federal agencies are focusing on ways they can leverage new technologies, such as automation, to improve IT service management and streamline cybersecurity processes, as they work to keep up with a threat landscape that changes constantly. ServiceNow’s Bob Osborn said that ServiceNow is integrating artificial intelligence capabilities into its platform so that agencies can use the newest automation technologies as they become available. […]

Sen. Sheldon Whitehouse, D-R.I., told Attorney General Jeff Sessions on Oct. 18 that he has found it impossible to talk to anyone from the Department of Justice about cybersecurity legislation. Whitehouse said during a hearing before the Senate Judiciary Committee that intelligence officials have told the committee that the election systems could be hacked by foreign actors. Whitehouse is interested in working with different agencies to develop legislation on cybersecurity. […]

The Department of Homeland Security met with the Election Infrastructure Coordinating Council to discuss risk management tactics for election cybersecurity. The council is working to build partnerships to keep election systems secure. […]

When Maria Roat became the chief information officer of the Small Business Administration, she had a few goals to accomplish in the first year: Get on Microsoft Office 16 and Windows 10, get to four racks on the agency’s data center, and move from copper to fiber. For a small government agency, these goals were ambitious. In Roat’s first month at SBA, a third of the agency’s network was saturated. Roat partnered with Microsoft to make these goals a reality. […]

The Department of Defense is recognizing National Cybersecurity Month by expanding cybersecurity education to families of service members. “This is not just an IT issue,” said Essye Miller, deputy CIO for cybersecurity and chief information security officer for DoD. “Everyone that’s operating on the network has a responsibility.” […]

The FBI needs access to encrypted files in order to protect the nation against cyber crime, according to Deputy Attorney General Rod Rosenstein. “Encryption is essential,” Rosenstein said “It is a foundational element of data security and authentication. It is central to the growth and flourishing of the digital economy. We in law enforcement have no desire to undermine encryption. But ‘warrant-proof’ encryption poses a serious problem.” […]

The FirstNet national communications network for first responders still faces challenges to ensure the network’s reliability, security, and interoperability. Mark Goldstein, director of physical infrastructure issues at the Government Accountability Office, said that FirstNet struggles with providing network coverage to rural and hard-to-reach areas, ensuring the network’s overall resiliency and cybersecurity, managing frameworks for verifying user identity, and prioritizing the users on the network. […]

Rep. Will Hurd, R-Texas, is working on the text of his bill to create the Cyber National Guard, a scholarship program that will help train students for cybersecurity jobs in the Federal government. Students who apply for the Cyber National Guard would receive scholarship money for cybersecurity training programs. Once the students graduate, they would spend the same number of years working for a Federal agency as they did receiving scholarship money to attend school. […]

The Department of Homeland Security has confirmed to MeriTalk that Barry West will serve as the acting deputy CIO, as well as be appointed to a limited-term senior executive service position as senior adviser. […]

South Korean officials announced that they suspect that North Korean hackers stole U.S. and South Korean military documents. A South Korean newspaper reported that hackers stole 235 gigabytes of documents from South Korean military networks in August and September of 2016. The documents included U.S. and South Korea personnel reports and a plan to assassinate North Korean leader Kim Jong Un. […]

Categories