Cybersecurity

NIST reports progress on cyber framework

power lines at sunset

The nation's critical infrastructure, including its power grid, is vulnerable to cyber attack. (Stock image)

The cybersecurity executive order President Barack Obama issued in February to fortify U.S. critical infrastructure is approaching a key benchmark, and officials note that while significant progress is being made, it remains an effort that will extend far beyond traditional deadlines.

Among the directives in the executive order was a measure for the National Institute of Standards and Technology to lead the development of cybersecurity framework within a roughly eight-month timeframe that would unify government expectations and requirements for public and private IT networks and systems. Since then, NIST has convened workshops involving both the public and private sectors, and key lessons are reportedly emerging.

"We're keenly aware and sensitive to the fact that we're more than halfway through the 240 days the president gave us, so we're working diligently with our partners at [the Homeland Security Department and White House], and the private sector," said Chuck Romine, director of NIST'S IT Laboratory. Romine, speaking June 12 in Washington, D.C., added that the cooperation is yielding best practices identifying standards that contribute to the overarching goals of the executive order.

Particularly important has been the involvement of the owners of privately run critical infrastructure, such as utilities, Romine said.

"The owners and operators of critical infrastructure really do understand the behavior of our infrastructure better than the federal government can, so working with them on voluntary standards is exactly the right way to go for raising the bar of the baseline of security for the nation's infrastructure," he said.

The development of voluntary standards is critical to federal cybersecurity, Rep. Gerry Connolly (R-Va.) added, highlighting that the time to act is now, before a potentially serious attack.

"If something terrible happens...the public reaction is going to be strong and federal action will be inevitable," Connolly said, noting disappointment that Congress so far has failed to pass cybersecurity legislation. "We won't be talking about voluntary standards."

Outside of regulatory and legislative efforts, other changes are underway -- particularly behind the scenes as some high-level cybersecurity heavyweights push for less-tangible transformation. Such changes mean the government must step away from the traditional border-defense view of security, according to Michael Daniel, White House cybersecurity coordinator.

"Ultimately we need to think about other models," Daniel said. "We could think of it in disaster management terms. Some of our government's main role there is to operate national weather center – they're able to integrate information from the private sector and government and where ever [information] is coming from. Not every storm in the physical world prompts a federal response....that kind of model could be useful to think about how to respond [in cyberspace]."

Another model for federal cybersecurity could be medicine, Daniel added.

"Thinking of it in a public health model approach, if you look at how malware spreads across the internet, it actually mimics the biological system," he said. "Thinking about it in terms of a medical approach... [such as] how much do you need to vaccinate to prevent it from spreading? Those models could be much more effective in how we think about what the federal government's global role and activities in cyberspace should be."

Elsewhere in Washington, NIST officials reported to Congress on the development of cybersecurity standards. In a Capitol Hill hearing on cyber spending, NIST Director Patrick Gallagher spoke to lawmakers about efforts under the executive order before much of the focus of the hearing shifted to National Security Agency surveillance activities.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above