Cybersecurity

Lawmakers, CSIS unveil cyber recommendations for Trump administration

  

A cybersecurity task force that included members of Congress focused on the issue recommended that the Trump administration improve and reorganize oversight authorities, elevate the role of the White House cybersecurity coordinator and clarify the cyber defense roles of civilian and military agencies.

The task force was co-chaired by Rep. Michael McCaul (R-Texas),  Sen. Sheldon Whitehouse (D-R.I.), former White House Senior Director of Cybersecurity Sameer Bhalotra as well as former Administrator of E-Government and Information Technology at the Office of Management and Budget and current transition team member Karen Evans.

McCaul serves as chairman of the House Homeland Security Committee, and Whitehouse is a ranking member of the Judiciary Subcommittee on Crime and Terrorism.

The recommendations in the report, released Jan. 5 by the Center for Strategic and International Studies, include policy, organizational and personnel proposals.

The report follows on the heels of the December report of the Commission on Enhancing National Cybersecurity, established by President Barack Obama in February. Two of its widest-ranging recommendations included the creation of an appointed post of assistant to the president for cybersecurity and the establishment of a new program to consolidate all civilian agencies' networks into a single network. CSIS's report included the first, but not the second.

One of the most contentious issues the task force considered, the report states, is the best approach for the protection of critical infrastructure.

In November, Trump laid out an agenda in which the Department of Defense would develop a "comprehensive plan to protect America's vital infrastructure from cyberattacks," an authority currently under DHS jurisdiction.

However, McCaul said that turning over these authorities to DOD would be a "grave mistake," and that this topic "has come up a lot in transition discussions."

"I don't believe the American people want to militarize our cyber defenses," he said. "We have civilian police officers, civilian FBI agents… We don't have the military walking through the streets… I think the same principle applies to cyber, in terms of needing a civilian agency to defend the nation's critical infrastructure."

McCaul added that to effectively fulfill this mission, DHS will need an independent operational component to carry out the specific mission of handling digital threats, rather than considering them a tangential focus.

In addition to elevating the White House cybersecurity post and establishing an independent cyber agency within DHS, the report put forward several organizational changes.

The report proposed the establishment of a Division of Data Protection within the Federal Trade Commission to strengthen consumer data security as well as the streamlining of agency committees, a responsibility that would fall to the Speaker of the House, the Senate majority leader and the Rules Committee.

Whitehouse also brought up the idea of a roving or independent oversight authority "across a wide array of civilian agencies" that would "stress test their security, rather than simply check off a minimum security checklist."

He also said that cyber incidents and the steps government is taking to mitigate threats need to be quickly relayed to the public to keep citizens informed.

"One obstacle to transparency is the culture of overclassification that pervades the executive branch," he said, suggesting Trump should designate a specific "cybersecurity discloser" position within the White House charged with reporting information to the public.

As far as specifics on which recommendations in the report would require legislative action, Whitehouse expressed uncertainty.

"I have not done a survey to see what can be accomplished by executive order versus what can be accomplished by legislative action," he said. "But clearly, there will be legislative action required."

Other recommendations in the report included the expansion of shared and cloud services, and efforts to build a robust IT workforce. To strengthen the tech pipeline, the report made the short-term recommendation to increase the number of visas granted and the long-term recommendation to allocate funds to DHS and the Department of Education to improve cybersecurity and STEM education.

About the Author

Chase Gunter is a staff writer covering civilian agencies, workforce issues, health IT, open data and innovation.

Prior to joining FCW, Gunter reported for the C-Ville Weekly in Charlottesville, Va., and served as a college sports beat writer for the South Boston (Va.) News and Record. He started at FCW as an editorial fellow before joining the team full-time as a reporter.

Gunter is a graduate of the University of Virginia, where his emphases were English, history and media studies.

Click here for previous articles by Gunter, or connect with him on Twitter: @WChaseGunter

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group