Feds seek 10% hike in IT security spending, as intelligence chief warns of cyberthreats
Proposed FY '09 budget also would earmark 10% of overall IT spending to security
Computerworld - In the same week that Director of National Intelligence Michael McConnell warned Congress that terrorists are showing an increasing desire to use cyberattacks against the U.S., the Bush administration sent a proposed budget to federal lawmakers that calls for the government to spend one out of every 10 IT dollars on information security.
In total, the White House said this week that it will seek authorization for more than $71 billion in IT spending during fiscal 2009, which begins Oct. 1. That request represents a 3.8% increase, or $2.6 billion, over what Congress approved last year.
The budget proposal earmarks $7.3 billion for information security, a 9.8% increase over what was budgeted for the current fiscal year. If approved as is, security spending would account for 10.3% of the entire federal IT budget.
Bush's proposal also would continue a trend in which security spending has been increasing at a rate that's greater than the growth of the overall IT budget. The White House, in its budget analysis (download PDF), said that if Congress accepts the fiscal 2009 figures as proposed, IT security spending will have increased 73% over the past five years, up from a starting point of $4.2 billion in fiscal 2004. By comparison, the overall IT budget will have risen 20% during the same period.
Karen Evans, administrator of e-government and IT at the White House Office of Management and Budget, said at a press briefing on the budget today that the proposed spending levels aren't being allocated toward any particular aspect of security within federal agencies.
"The focus isn't investment-specific — it's making sure they are managing the risk associated with the services that they have," said Evans, who is the federal government's de facto CIO.
She added that as more and more government services become available online, "the agencies are very well aware of what the risks are."
McConnell testified before a Senate panel yesterday and a House committee today on his annual threat assessment report to Congress (download PDF). As part of the report, he issued a broad warning about the cyberthreats faced by both the government and the private sector, saying that potential vulnerabilities are only increasing because of globalization and the growth of computer networks.
McConnell cautioned in the report that Russia, China and other countries "have the technical capabilities to target and disrupt elements of the U.S. information infrastructure." And he said that terrorist groups such as al-Qaeda, Hamas and Hezbollah "have expressed the desire to use cyber means to target the United States."
Read more about Government IT in Computerworld's Government IT Topic Center.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Bring Networks and Applications Closer--Cisco ONE
- A series of sweeping trends is placing new requirements on the tried-and-true network model--requiring network infrastructure and applications to communicate. Get the open...
- Lippis Research Reviews the Cisco Catalyst 2960-X
- In this Lippis Report Research Note, Lippis Research reviews the latest edition of the "most popular access switch on the planet" -- the...
- Design Guide--Scaling Up to a Campus-Wide LAN
- Is it time to scale your network environment to a campus wired LAN? Here's the framework you need to set up your LAN...
- Comprehensive Security: Cisco Catalyst 2960 Series
- With a rich and comprehensive set of security features, Cisco Catalyst 2960-X and 2960-XR Series Switches can help you address networking megatrends such...
- Be Energy Efficient--The Cisco Catalyst 2960 Series
- How much energy could be saved if all 230 million Layer 2 and 3 fixed managed switch ports sold in 2012 were as... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- Vblock™ Specialized System for SAP HANA® Overview video from DJ Long about the new Vblock Specialized System for SAP HANA®.
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 20, 2013.