Lawmakers question DHS preparedness for fighting cyberattacks
A cybersecurity leader for the agency is expected 'very soon'
IDG News Service - The ongoing delay in appointing an assistant secretary for cybersecurity at the U.S. Department of Homeland Security (DHS) may be hindering the agency's ability to fend off cyberattacks against the nation's critical infrastructure, lawmakers suggested today.
In response, DHS Undersecretary for Preparedness George Foresman said his agency is in the final stages of reviewing the credentials of a "very qualified" individual and that the position is likely to be filled "very soon."
"This has been, and remains, a top priority" at the DHS, Foresman said during a hearing on cybersecurity for the national infrastructure. The hearing was conducted by the House Commerce Committee Subcommittee on Telecommunications and the Internet.
DHS Secretary Michael Chertoff announced the creation of a new assistant secretary for cybersecurity and telecommunications last October. The move was widely welcomed at that time because it was seen as recognition of the need to elevate the importance of cybersecurity issues within the agency. Before Chertoff's announcement, cybersecurity issues were being handled at a director-level position at the DHS. Since Chertoff's announcement, however, the position has remained vacant.
In his opening statement at the hearing, Rep. John Dingell (D-Mich.) said that the failure to appoint an assistant secretary "conveys a lack of appreciation" of the nation's cyberthreats by the DHS. Dingell noted that cyberattacks against the critical infrastructure are growing and that any failure to prepare for them could be "devastating." He added that the country shouldn't have to wait for a "massive cyberdisaster" to put plans in place.
Reacting to similar concerns from Rep. Jay Inslee (D-Wash.), Foresman noted that the absence of an assistant secretary had not stopped the DHS from moving forward with response planning. "We have been in overdrive the whole time," he said.
Criticism for the DHS at today's hearing was not limited to that one issue, however. David Powner, director of IT management issues at the U.S. Government Accountability Office (GAO), noted that DHS had so far failed to establish a comprehensive plan for responding to cyberthreats against critical infrastructure.
He said that criminal groups, foreign intelligence services and terrorists all have the ability to launch disruptive physical and cyberattacks. While the DHS developed high-level plans for infrastructure protection, components that address Internet recovery are "incomplete", Powner said. In addition, while the DHS has begun working with private industry on processes for jointly responding to cyberattacks, the initiatives are "immature" and lack deadlines for completion, he said.
Also, hampering the department's efforts to establish a recovery plan is a lack of agreement over what the agency's role should be when a disruption does occur and when it should get involved, he said. In addition, the private sector has been reluctant to share information with the DHS because "it doesn't see a value in sharing" and lacks trust in the leadership, Powner said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts