Calling for security leadership

House Homeland Security Select Committee Report: Cybersecurity for the Homeland

Related Links

Administration officials must provide better leadership during President Bush's second term for dealing with cybersecurity threats, a panel of security industry officials said today.

Industry officials criticized what they said is a lack of follow-through on the President's National Strategy to Secure Cyberspace, released in February 2003, and on recommendations that industry and government leaders made earlier this year. Both sets of recommendations call for voluntary actions rather than new regulation to strengthen the nation's cyberdefenses.

Speaking at the National Press Club in Washington, D.C., security industry officials urged government officials to act on 12 recommendations, including the creation of a national cyberthreat center. Government intelligence about cyberthreats against privately owned and operated infrastructures such as oil pipelines and telecommunications could be collected and analyzed there and then shared with industry officials.

"All of these things should be done and be done quickly," said Art Coviello, president and chief executive officer of RSA Security.

The panel, composed of members of the Cyber Security Industry Alliance (CSIA), proposed that the federal officials also:

Create and appoint an assistant secretary for cybersecurity in the Homeland Security Department.

Ratify the Council of Europe's Convention on Cybercrime to deny safe haven to cybercriminals.

Promote better awareness among corporate executives of the cybersecurity implications of the Sarbanes-Oxley Act and other legislative mandates on businesses.

Lead by example by using the federal procurement process to bring more secure technologies into the federal government.

Provide more funding for Information Sharing and Analysis Centers in which critical business sectors share information.

Establish and test an emergency coordination network that could provide vital communications in the event of a major disruption of Internet communications.

Direct a federal agency to track the economic costs associated with cyberattacks.

Increase long-term research and development funds for cybersecurity.

Increase funding for the Office of Management and Budget and the National Institute of Standards and Technology's Computer Security Division, which have a congressionally mandated responsibility for developing cybersecurity technical standards and policy guidelines.

Reduce the time and costs involved in certifying commercial software through the government's National Information Assurance Partnership program.

Form a government and private-sector task force to recommend concrete actions to secure the digital control systems used to operate the nation's electrical transmission grid, wastewater treatment facilities and other critical infrastructures.

CSIA sponsored the panel. In February, nearly a dozen computer security companies formed the alliance to influence public policy and spending on cybersecurity. The group includes well-known computer security firms whose members seek improved relations with government agencies that collect cybersecurity threat information.

Current members of CSIA are BindView, Check Point Software Technologies, Citadel Security Software, Computer Associates International, Entrust, Internet Security Systems, Juniper Networks, McAfee, PGP, Qualys, RSA Security, Secure Computing, Symantec and TechGuard Security.

Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.