Twelve years ago last week, President Bush signed the act creating the Department of Homeland Security. It came into formal existence on March 1, 2003. Anniversaries are days to reflect on broader issues, and it is a good time to reflect on what has occurred since DHS was created – and what that means for the Department’s current and future missions and challenges.
By David Z. Bodenheimer
The U.S. federal government’s acquisition rules and buying practices have a direct impact upon major segments of the U.S. and global marketplaces. Cybersecurity Executive Order 13636 and Presidential Policy Directive 21 both recognize that the federal acquisition process must be addressed as part of the overall federal strategy for enhancing cybersecurity. It is time to harmonize the cyber acquisition regulations.
Increasing adoption of cyber insurance products and frequent cyber-related initiatives across the insurance and risk world has been incredibly positive. Yet, many companies that are not consumer-facing are struggling with the insurability of their increased exposure. The insurance industry needs to embrace this evolving reality.
The oddly named cyber vulnerability, Heartbleed, is everywhere in the tech news. Even non-tech security types recognize the seriousness of this issue. What is the bumper sticker version of Heartbleed, and what does it teach us? While the Open Source aspects of the Internet yield incredible innovations, they also open up vulnerabilities.
“Balkanization” is a splitting into many opposed factions closely located in one area. It ain’t good to be Balkanized, but that is what is happening to the Internet, and there is nothing Washington can do about it. The Obama Administration’s move to let go of U.S. government control over the naming rights of Internet sites is being viewed as the latest in a long line of U.S. withdrawals from control of the Internet.
As a new DHS Secretary takes the helm, Security Debrief contributors came together for the First Chris Battle Homeland Security Colloquium. In the spirit of the late Chris Battle’s vision for debate and discussion on pressing homeland security matters, contributors weighed a series of important questions about DHS’ future.
The House Homeland Security Committee did something yesterday it has not done in the past several years, for anyone: it came out in full force for DHS Secretary Jeh Johnson’s maiden appearance before the committee. It was a positive performance by the Secretary, who showed himself adept at answering questions, even as his lawyer’s instincts kept him from falling into political traps.
On Thursday, February 27, 2014, Security Debrief and Catalyst Partners will host the First Annual Chris Battle Homeland Security Colloquium. Security Debrief’s expert contributors will come together to discuss and debate the current state of U.S. homeland security, DHS, and the threats and priorities the country will face in the year ahead.
By Gary Warner
This week, President Obama unveiled a set of guidelines issued by the National Institutes of Standards and Technology and a new public-private partnership program. While I join with others in applauding Mr. Obama’s creativity in making progress in protecting our nation’s cyber infrastructure, it is important to note what is and what is not being addressed by these guidelines. Where, for example, does the Target Breach fall?
Of all the big stories to keep your eye on for 2014, what are three, base-level “working-stiff” issues? They are mobile computing, defense readiness, and the connection between Special Operation Forces and intelligence. If we can get these right, it would take us a long way towards better security.