Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
DHS striving to avoid 'tragic mistake' under cyber program
Thursday - 5/29/2014, 4:30am EDT
The Homeland Security Department is betting on the former by taking specific steps to ensure the right people have the right data to protect federal networks.
John Streufert, the director of federal network resilience at DHS, said one of the future task orders under the CDM program is to pair subject matter experts with agency chief information security officers and system administrators to ensure they understand and use the information from the network sensors and other cyber tools, including a dashboard, currently in the implementation stage.
"That dashboard will see to it that the sensor data, which is collected, queues up those worst problems, first in a way so the departments and agencies know every morning when they open their list of problems to take care of, they are working on the most serious problem affecting the organization from a technical point of view," Streufert said in an interview with Federal News Radio after speaking on a panel Wednesday about CDM at the Cybersecurity Summit sponsored by AFCEA's Washington, D.C. chapter.
"We really have a composite of actions to take which are to find the most challenging of the technical problems, but also to understand how those systems affect the business operations of the cabinet department or agency," he continued. "So it's that extra involvement of the business executives that benefit from many of the current FISMA quarterly reports will have that added bit of information to highlight exactly the kinds of changes that are most necessary to protect their systems and important data."
Foundation under construction
To help agencies get the most out of the sensors, DHS will run a series of task order competitions in the coming weeks among the 17 CDM blanket purchase agreement contract holders to provide both the technology and the subject matter expertise to meet this goal.
Streufert said DHS still is in phase one of the CDM contract to provide the foundation for continuous diagnostics and mitigation.
"We have to get the labor to run the sensors. We've already purchased tools to fill in the gaps for a number of agencies who are starting from scratch or need to get a common look across their entire organization. We expect that to dominate the rest of this fiscal year's competitive activity," he said. "Then we are setting the stage for the next phase of our program, which will talk about managing privileges."
DHS issued a request for information on April 21 to get vendor feedback on how best to manage privileges of system administrators under CDM. Streufert said DHS plans to host industry days, webinars and to release a draft RFP in the coming months.
Some experts say the CDM program could falter if agencies don't understand the difference between mitigation and monitoring.
Alan Paller, the director of research for the SANS Institute, said, during the panel, that mitigation is solving the most pressing cyber problems. Monitoring is knowing there is a problem, but not necessarily acting on it.
"We are on the edge," he said. "If we are only sending data and no one is using it, what's it matter?"
Grading agency, vendor progress
Paller said agencies need to have a well-trained systems administrator to take the data and make changes to the agency network security.
"Automation is essential, and it's worth every dollar you spend on it, but it's oversold and has failed in almost every case because you need the people to do something with the data," he said.
SANS is planning a CDM workshop in August where Paller promises to call out the vendors who are providing mitigation versus monitoring.
In fact, Paller said SANS may also detail public ratings on vendors and agencies in how they meet the goals of CDM and how they implement SANS 20 critical controls.
Streufert said it would be a "tragic mistake" for agencies not to use the data provided by the sensors under the CDM program.
"A portion of the system challenges come through outdated software or system elements that do not meet all the needed business purposes of the department or agency, and that's where the ongoing conversations between known threats on existing systems and the future directions that the technology programs of the departments and agencies need to take can come together in a very beneficial way."