DHS releases cybersecurity blueprint

New document describes two-pronged approach to cyber protection

The Homeland Security Department released a new cybersecurity strategy document with a two-pronged approach: protecting critical infrastructure today and building a more secure cybersecurity ecosystem for the future.

The Blueprint for a Secure Cyber Future was released on Dec. 12 as a framework for responding to evolving cyber threats.

The blueprint describes alignment of departmental activities with the National Strategy for Trusted Identities in Cyberspace.

It also aligns with the White House's National Security Strategy and with DHS' 2010 Quadrennial Homeland Security Review.

"DHS is on the right track to split these two missions," Jason Healey, director of the Atlantic Council’s Cyber Statecraft Initiative, wrote in an article on Dec. 12. "The cyber ecosystem interconnects each and every person and device in cyberspace, which requires a very wide aperture with heavy emphasis on education and outreach. In comparison, protecting critical information infrastructure includes a much smaller (but still dauntingly large) number of companies and organizations with different laws, including some regulatory authority."

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.


  • 2018 Fed 100

    The 2018 Federal 100

    This year's Fed 100 winners show just how much committed and talented individuals can accomplish in federal IT. Read their profiles to learn more!

  • Census
    How tech can save money for 2020 census

    Trump campaign taps census question as a fund-raising tool

    A fundraising email for the Trump-Pence reelection campaign is trying to get supporters behind a controversial change to the census -- asking respondents whether or not they are U.S. citizens.

  • Cloud
    DOD cloud

    DOD's latest cloud moves leave plenty of questions

    Speculation is still swirling about the implications of the draft solicitation for JEDI -- and about why a separate agreement for cloud-migration services was scaled back so dramatically.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.