Veterans Affairs

VA launches cyber squad

Shutterstock imag (by Benjamin Haas): cyber coded team.

(Benjamin Haas / Shutterstock)

LaVerne Council, the new CIO at the Department of Veterans Affairs, has assembled a team charged with coming up with an overall cybersecurity plan for the agency. The new Enterprise Cybersecurity Strategy Team will be led by Susan McHugh-Polley, a senior executive program manager at VA.

The team includes executives and subject matter experts from across the VA's Office of Information and Technology.

"The team's scope includes management of current cybersecurity efforts as well as development and review of VA's cybersecurity requirements and operations holistically -- from desktop to software to network protection," a VA spokesperson told FCW.

A summary of the plan will be made public once it is completed and presented to Congress, per the spokesperson. The plan is due to be completed in 45 days, according to an article in FedScoop, which first reported on the VA's new cyber effort.

The current cybersecurity strategy, dubbed "defense-in-depth," uses the Einstein 3 network protection system offered by the Department of Homeland Security as its perimeter defense. There are additional layers of protection around local networks, devices, data centers, and servers.

Stephen Warren, who served as acting CIO at VA for more than two years and is currently Council's deputy, published monthly reports on intrusion detection under Einstein 3, as well as potential data loss as a result of mishandled files and lost or stolen computer equipment.

According to a July fact sheet released just before Council was sworn in as VA's top tech official, the department has encrypted all of the more than 438,000 laptops and desktops on its network, and decreased its critical or high vulnerabilities by 71 percent between November 2014 and May 2015. Despite some gains, VA's inspector general gave the agency a failing grade on information security in the most recent security audit because of multiple outstanding recommendations going unfulfilled over several years.

The most recent public report for June 2015 said there were 2,076 veterans affected as a result of mishandled information, such as incidents in which printouts of patient information were displayed openly in public settings. None of the potential data loss incidents were the result of cyber attacks, according to the VA report.

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy and the Department of Veterans Affairs. Prior to joining FCW, Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, New York Press, Architect Magazine and other publications.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.


Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.