Legacy IT, legacy acquisition compound cyber risk

Shutterstock image (by dencg): digital warning sign.

The way the government buys technology can constrain efforts to protect federal systems from cybersecurity threats, says Michael Daniel, the top White House advisor on cybersecurity.

Federal agencies continue to rely on legacy systems that are vulnerable to intrusions and hard to secure. "The burden of legacy in government is a huge one," Daniel said at the Billington Cybersecurity Conference in Washington, D.C., on Sept. 17. Government is struggling with the problem of how to move off of old systems. "We have architectures and hardware and software in places that is indefensible, no matter how much money and talent we put on it. We don't have a good process for moving off," Daniel said.

Security measures are often bolted on to older hardware, software and operating systems, "rather than being deeply embedded in the product," Daniel said.

Compounding the problem are legacy acquisition methods. "We treat computer systems as a gigantic capital investment like a building, rather than investments you need to continually refresh," Daniel said. But moving to a more flexible budgeting and acquisition system, to allow for revolving funds and other more nimble financial instruments, requires new law. "We're going to need some help from Congress. There's a very strong resistance to making some of those shifts among a lot of folks on the Hill," he said.

Daniel also said that efforts by the private sector to modernize IT could yield some insights for government.

"I’m very interested in looking at what industry has done in that space. You can never take what the industry does and just plop it on the government, because that never works. But there are lessons that we can learn from that area," he said, speaking to reporters on the sidelines of the conference. "I think we really do need to look at how we're provisioning cybersecurity across the federal government, particularly on the federal civilian side. It's clear that what we've been doing is not sufficient, and we need to step up our game in that area."

The government is using the aftermath of the Office of Personnel Management hack as an opportunity to do an assessment of its cybersecurity exposure. Daniel said that effort, being led by the Office of Management and Budget and the Department of Homeland Security, is designed to find out if there is an accurate accounting of "all the big pools of information like the big background check database, and do we feel we are taking adequate steps to protect those."

While the effort hasn't discovered anything on the scale of the OPM hack, "because we are looking more and looking with better tools, we are finding more stuff," Daniel said.

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy and the Department of Veterans Affairs. Prior to joining FCW, Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, New York Press, Architect Magazine and other publications.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.


  • Comment
    customer experience (garagestock/

    Leveraging the TMF to improve customer experience

    Focusing on customer experience as part of the Technology Modernization Fund investment strategy will enable agencies to improve service and build trust in government.

  • FCW Perspectives
    zero trust network

    Why zero trust is having a moment

    Improved technologies and growing threats have agencies actively pursuing dynamic and context-driven security.

Stay Connected