DHS creates emergency response team

Following months of informal coordination, Homeland Security Department officials today created the U.S. Computer Emergency Response Team to lead all incident prevention, warnings and response efforts across the country.

Under the department's National Cyber Security Division, the US-CERT is intended to be "a single streamlined center for incident response," said Robert Liscouski, assistant secretary for infrastructure protection at DHS.

Liscouski spoke at a breakfast meeting sponsored by the Information Technology Association of America.

DHS' creation moved the government's cyberattack response capabilities into a single organization at the beginning of the year. Personnel and processes have already been tested to a certain extent by the recent Internet worms and viruses, such as Blaster and SoBig.F, said Larry Hale, director of the Federal Computer Incident Response Center, which will be a significant part of the US-CERT.

However, officially establishing the US-CERT includes forming a strategy and priorities specifically for this function.

These include:

*Better and faster warning and response, with the immediate goal of cutting response time to 30 minutes or less by the end of 2004.

*Better coordination and dissemination of information, establishing the center as the place for national information.

*Reducing vulnerabilities through common development practices and education.

*Improving incident prevention and detection capabilities.

Defining what type of response is required within 30 minutes will be difficult, Liscouski said. At the start, it may be simply a response that something is happening, with details to come later on exactly what it is and what people must do, he said.

The key to all of the priorities, however, is to provide specific goals for the new organization. "We want to have very definable metrics by which we can measure performance," he said. "We know we're being ambitious here, but these times call for being ambitious...we're going to take risks, make mistakes and make adjustments."

Coordination with industry warnings and response will be important — and one message that the entire division will focus on is that the US-CERT information is at the top of the ladder, while company-specific information fills in the details under that, Liscouski said.

Industry must do more than stay in touch with the division. "We need solution sets," said Frank Libutti, undersecretary of information analysis and infrastructure protection. "We don't need stale rhetoric."

The US-CERT's core capabilities will be supplied by the Carnegie Mellon University Computer Emergency Response Team Coordination Center (CERT/CC), building on the relationship FedCIRC established, Liscouski said.

FedCIRC will continue as an entity within the larger organization. But the new partnership with the coordination center will include additional funding for the CERT/CC, to enhance exiting capabilities and to establish new ones, Liscouski said.

Featured

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.