Government can't secure cyberspace alone, says DHS secretary

Private sector has a role

Government can't secure cyberspace by itself, said Homeland Security Secretary Janet Napolitano in a speech she delivered April 27.

“This rapid and dispersed rate of change in the cyber sphere has led the Department of Homeland Security to pursue an approach that acknowledges that we all have a role to play,” Napolitano said. “Today’s threats require the engagement of our entire society – from government and law enforcement to the private sector and importantly, individual members of the public.”

She outlined DHS efforts to improve government IT security and also cited cooperative efforts with the private sector, including the investigation of a recent breach of RSA security tools.


Related stories:

China might be winning cyber war

Government should fund infrastructure protection efforts 


Napolitano made her comments in a speech at the University of California Berkeley's College of Engineering that she billed as a follow-up to the first State of America’s Homeland Security address in January at George Washington University. Things have gotten better since the 2001 terrorist attacks, she said, but they have not gotten good enough, she said. One domain that needs improvement is cyberspace, where developments in functionality typically outpace security.

“Today, our biggest opportunities, like our most urgent threats, are networked,” she said. “The pace of innovation has accelerated and become more and more decentralized, but so too have the methods to attack our way of life, especially online.” She added that “in a very short amount of time, we have also grown dependent on digital networks working reliably and securely as part of our day-to-day — actually more like minute-by-minute — lives.”

DHS has two primary roles in cybersecurity. The first is protecting the federal executive branch civilian agencies, the .gov domain, and the second is leading the protection of critical infrastructure and its connections to cyberspace. Although the military has established a Cyber Command with responsibility for defending military cyberspace and for responding to and waging cyber war, this responsibility does not officially extend to civilian critical infrastructure.

“At DHS, we believe cyberspace is fundamentally a civilian space,” Napolitano said.

In the .gov domain, DHS is implementing the National Cybersecurity Protection System, which includes the EINSTEIN intrusion detection system, and is developing the National Cyber Incident Response Plan.

In the private sector, DHS' responsibility is limited to cooperative rather than regulatory efforts.

When RSA was hacked, compromising the company’s SecurID token, DHS and law enforcement and intelligence communities worked with the company.

“We took our understanding of the tools, tradecraft, and techniques used by these malicious actors and converted it into actionable information that all 18 critical infrastructure sectors could use to employ mitigation measures that would lower their risk to the type of attack we saw at RSA,” Napolitano said.

An administration initiative to improve cybersecurity is the National Strategy for Trusted Identities in Cyberspace, which is part of a broader vision for a more secure online environment.

“Over the longer term, we want to move toward agile, interoperable computer systems and networks that can be reliably authenticated and that can recognize and respond to threats in real time,” Napolitano said.

Napolitano called on industry to redouble its efforts to increase the reliability and quality of the products that enter the global supply chain and made a pitch for government service.

“Perhaps above all, we are focused on building a world-class cybersecurity team by hiring a diverse group of cybersecurity professionals — computer engineers, scientists and analysts — to secure the nation’s digital assets and protect against cyber threats to our critical infrastructure and key resources,” she said. “It should not be unusual for a top computer scientist to take a leave from academia or the private sector and spend a couple of years in government — and hopefully, at DHS — working on solving important technological problems.”

About the Author

William Jackson is a Maryland-based freelance writer.

Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.