Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Agencies spend too much time on cyber defensive
Friday - 1/28/2011, 2:03pm EST
By John Buckner
Federal News Radio
The government remains on the defensive when it comes to cybersecurity.
"Right now, on the Internet, offense wins," said Philip Reitinger, deputy undersecretary of National Protection and Programs directorate in the Homeland Security Department, during an event earlier this week sponsored by Potomac Institute in Arlington, Va.
But Reitinger and Lt. Gen. Robert Schmidle, deputy commander of the U.S. Cyber Command in the Defense Department, say there are things the government can do to make the offense a little less potent.
Schmidle said the potential development of a cyber common operational picture is an important step to lowering the success of attacks.
Schmidle said DoD wants to "bring these data feeds in from all of the services, agencies...that participate and that will be a real challenge."
As much as Schmidle believes that the Cyber Command is necessary for being able "to do this defense piece the way that we need to be able to do it" the reluctance to "expose everything you do to someone else" stands in the way.
To that end, Reitinger said there are a few things agencies can do, but there are "no ruby slippers." He said if any "entity, whether it be a public sector entity or private sector entity says it's going to solve all of your problems then they are asking you to put on a pair of ruby slippers."
Reitinger said there are four things that agencies and vendors can improve up on to better secure their networks.
Among those, he said, are "more secure components, greater use of strong ties enhancing authentication, use of automation and interoperability broadly so we're able to have a set of devices and people that can react to the internet speed and an automatic way so the only barriers to collaboration are those being posed by policy as opposed to imposed on us by technology."
Reitinger said cybersecurity remains an administration and DHS priority, placing it in the department's top five mission areas.
"In a bipartisan way, from the past administration into this administration, there has been continual progress on defining capabilities and roles and responsibilities," said Reitinger.
Schmidle said one thing DoD is considering is the use of technology hashing to improve their cybersecurity.
"If you were the commander of an agents cruiser, for example, that you could come up to a bridge and you could boot up your machine and you could bring up a page, whatever you need, and you could immediately tell whether or not your data base had been changed at all since the last time you looked at it," said Schmidle.
However, one theme resounded true among Schmidle and Reitinger.
Can there be reasonable discussion of cyber issues at the unclassified level?
"I do believe we can talk about this in an unclassified way. I do believe we have to talk about this in an unclassified way and it needs to be a public dialogue about what needs to happen," said Reitinger. Schmidle added that "raising the cadre of civilians, for example, that are deeply immersed in the theory and nature and understand cyber from a perspective that perhaps the practitioners do not; that's a good thing, I think that's helpful."
John Buckner is an intern with Federal News Radio.
(Copyright 2011 by FederalNewsRadio.com. All Rights Reserved.)