Time to move beyond FISMA, CISOs say

The Federal Information Security Management Act (FISMA) will be five years old in November, and it has achieved its goal of raising the government’s awareness of cybersecurity, federal officials say.

Some chief information security officers say agencies must move beyond the law’s requirements to address real-time monitoring and install proactive and dynamic defenses.

“We need to move above and beyond the paper exercises and see what is happening and evaluate ourselves against it,” said Ed Meagher, the Interior Department’s deputy chief information officer. “We can’t stop doing the reporting that FISMA requires, but we need to look for ways to understand what the threats are and in real time.”

Michael Castagna, the Commerce Department’s CISO, said FISMA provided visibility and a way to communicate security requirements to senior managers and other employees.

“Security must be rooted in the organization’s culture,” he said during a panel discussion on information technology security sponsored by Cisco Systems and FCW Events. “FISMA helped us put security in our governance processes, [such as] capital planning and investment control, IT investments, and enterprise architecture.”

One agency participant agreed with Meagher and Castagna that FISMA has succeeded in getting agencies to focus on security in their day-to-day operations.

Now CISOs must take a more aggressive approach to spreading the word about cybersecurity, Meagher said.

“The CISO community is hesitant to speak up because they feel like they are not at the table [with other chiefs] yet,” he said. “The one thing they must stop is management complacency. Telling them to do it is not enough.”

Meagher said it is best for CISOs to be visible throughout the agency and have a track record of success.

“You need to know your priorities based on your mission needs,” said Dennis Heretick, the Justice Department’s CISO. “You then prioritize your requirements based on risk.”

Patrick Howard, the Department of Housing and Urban Development’s CISO, said the agency focuses on ensuring security when planning and developing new systems.

“We are designing the controls at the right stage to support our business better,” he said. “We are trying to move out of playing catch-up with our older systems.”

Heretick said the risk for most agencies is at the install bases, so Justice is focusing on them first and using new systems to replace applications that cannot be updated or are too expensive to improve.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Shutterstock image: looking for code.

    How DOD embraced bug bounties -- and how your agency can, too

    Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

  • Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group