Cyber assurance needs teeth

Share this article:
Greg Hoglund, CEO, HBGary
Greg Hoglund, CEO, HBGary
Soon, the federal government will release the results of its 60-day interagency review of cybersecurity, conducted by Melissa Hathaway, acting senior director for cyberspace for the National Security Council (NSC) and Homeland Security Council. Ms. Hathaway appears to have a good understanding that cooperation between agencies is required for success. The government is a landscape of fiefdoms and it takes special skill to navigate those waters. This is why strong leadership is critical because without it, everything downstream will devolve into overlapping roles, missions, silos and waste.

Coordinating federal agencies is just the beginning. Successful cybersecurity depends on strong relationships with private industry. The government will need to apply pressure to meet tangible objectives that are unbiased, something policymakers are historically poor at doing. Perhaps it's time to pair the best of both worlds -- a proven executive with experience managing to objectives, and a team that understands government intricacy. Corporations are given maybe nine months to implement a change; in government it's every four years. The American public and government can't afford four years of negotiation.

The administration needs to take firm action now to give organizations the tools to fight cyberthreats. Acquisition and sharing of threat intelligence is critical. Law enforcement agencies need authority to use this information and technology to apprehend and prosecute cybercriminals. Over time things will get better, as long as we can fight the enemy today.



Share this article:

Sign up to our newsletters

More in Opinions

Unfair competition: Proactive preemption can save you from litigation

Unfair competition: Proactive preemption can save you ...

With each job change, the risk that the new hire will bring confidential information or trade secrets with him or her to the new company grows.

Hackers only need to get it right once, we need to get it right every time

Hackers only need to get it right once, ...

Hackers only need to find one weak point to steal valuable information. On the flip side, security pros need to account for every possible scenario.

Successful strategies for continuous response

Successful strategies for continuous response

While it isn't realistic for organizations to expect that it will never happen to them, a rapid, professional and continuous response can limit their scope and reputational impact.