Cybersecurity

'Cultural shift' aids continuous monitoring

Placeholder Image for Article Template

Continuous diagnostics and mitigation tools are becoming a regular feature of federal agencies' thought processes as the cross-government cyberthreat mitigation effort evolves, according to officials in charge of implementing the programs.

Agencies seeking to catch cyberthreats in real time and increase situational awareness before problems cause damage are beginning to internalize the development of CDM capabilities, said Margie Graves, deputy CIO at the Department of Homeland Security, during a Feb. 20 panel discussion sponsored by the Association for Federal Information Resources Management.

The added consideration is the result of upfront communication and collaboration among agencies, and a willingness to increase the ability to handle a fluid threat environment, she said.

It's a cultural shift for agencies accustomed to security checklists and formal reviews, Graves said, and the challenge is made doubly hard by technological game-changers such as mobile, cloud computing and open data.

Agencies have already begun implementing the initial phase of the CDM effort under blanket purchase agreements FEDSIM released last summer, said Steve Viar, director of the General Services Administration’s Federal Systems Integration and Management Center (FEDSIM).

GSA is DHS' partner in offering CDM products across government. DHS oversees development of overall agency requirements for cyber defense gear and services, while GSA oversees procurement, operation and maintenance of the electronic diagnostic sensors that federal agencies will deploy on their networks to detect cyber intrusions, and the electronic dashboards that accumulate and analyze that data.

Viar said the release of additional contracts for dashboards that will collect intrusion data is imminent. The dashboards will provide summary information from participating agencies that will feed into a central federal-level dashboard.

Graves and Viar said the dashboards are crucial elements in the growing acceptance of CDM at federal agencies. The ability to address cyber intrusions and attacks in real time is a big improvement over agencies' older practice of documenting and cataloging intrusions and then going back to correct problems in a three-year review cycle.

About the Author

Mark Rockwell is a staff writer at FCW.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

  • FCW magazine

    What to make of the Alliant 2 protest rulings

    With the pre-award protests all resolved in GSA's favor, is the $50 billion IT services contract now bulletproof?

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group