Letter: Overburdening program managers puts security at risk

Information security is a full-time job, not another responsibility for overloaded program managers to assume, writes one reader.

The title of “Program managers are also security managers” should scare anyone who is concerned about information security and privacy in the federal government because it is highly accurate. Information technology management is so distributed in the federal government that it frequently falls to the program manager to decide how much security to implement and how to implement it. This is yet another area we expect program managers to be experts in, despite a frequent lack of training, inadequate budget and rapid change in the state of the art of attacks. Most frighteningly, the systems program managers are responsible for are usually networked with other systems, managed by other program managers. In IT security, the chain is truly only as strong as its weakest link. The most serious network attacks find vulnerabilities in one network and then follow trust relationships between networks to discover valuable information.

 


I contrast this approach with the (unnamed) large (90,000 people) corporation where I was recently a chief information officer. At this corporation, a panel of security experts sets IT security policy for the company. CIOs are expected to implement that policy, and all of their networks are audited to determine compliance with the policy. The results of these audits are published to the chief executive officer and board of directors. Failing an audit gets the highest levels of attention and usually invokes the other meaning of CIO: Career Is Over.


Information security is a full-time job, not yet another responsibility for overloaded program managers to assume. Until the federal government implements a serious information security management structure, breaking down its sacrosanct agency, office and program independence, information compromise is inevitable. A chain is only as strong as its weakest link, and the federal IT system chain is tens of thousands of links long.


Anonymous


What do you think? Paste a comment in the box below (registration required) or send your comment to letters@fcw.com (subject line: Blog comment) and we'll post it.