Department of Homeland Security agencies must balance computer and communications network improvements slated for the next 12 months with tight budgets.
5 Online Tools Uncle Sam Wants You To Use
(Click image for larger view and slideshow.)
The Department of Homeland Security and its various agencies are updating their computer and communications networks with the goals of improving security and increasing efficiency within the next year. Individually, these organizations are creating new joint command centers, issuing mobile devices to their personnel, and launching new research and development projects. But with the progress, there remains the challenge of a tight fiscal environment that pushes bureaus to do more with less, DHS officials said.
The DHS is moving its cyber command and control capability to a new DHS/Coast Guard security operations center in Washington D.C., said Rear Admiral Robert Day, commander of the Coast Guard's cyber command and its chief information officer, at a recent briefing with industry executives held by the Armed Forces Communications Electronics Association. At the same time, the Coast Guard will move its DOD-oriented cybersecurity operations center to the same facility. Day said the joint center, scheduled to be operational in July, will provide improved communications and coordination for cybersecurity efforts across the .gov and .mil network spaces.
Besides establishing new facilities, the DHS also has made progress on several cyber initiatives. The first is a continuing diagnostics and monitoring capability that will help defend DHS networks and provide network administrators with a better picture of how their networks operate, especially in those public-facing areas of the network, Day said. When it is fully launched, this full-time diagnostic capability will be expanded across the federal government. Continual diagnostics and monitoring will be especially helpful in managing government networks with public-facing websites, he said.
To improve its network security, the Coast Guard is in the process of moving its secure and nonsecure email to the DOD's secure cloud. Day hopes to fully transition the bureau's email within the next 12 months.
But looming budget cuts might affect how much IT security the Coast Guard can accomplish. Day noted that the proposed 2016 fiscal year budget "takes us back to almost sequestration levels." The service faces a dilemma regarding its limited resources: it must spend $1.3 billion to acquire new planes and ships to replace and modernize its aging platforms, but no funding was allocated for IT. Day said he is working to put a $10 to $15 million "wedge" in the budget to cover the oversight. The Coast Guard previously funded its IT expenditures from its operational budget, but this has shrunk with the bureau's overall budget, he said.
Balancing between new technology and tight budgets also affects the DHS's other agencies, such as the Customs and Border Protection agency. The largest law enforcement organization in the country, its dual mission is to protect the US from terrorists and organized crime while facilitating safe trade and travel across the nation's borders, said Wolfe Tombe, the CBP's chief technology officer.
Among the CBP's major concerns are: introducing mobile technology to help support its mission, cybersecurity, and moving its data to the cloud. All of these efforts help the CBP cut its costs, Tombe said. This is necessary because over the last four years the CBP's Office of Information and Technology has lost nearly 50% of its budget, he said. Because of the tight finances, the CPB is looking for new technologies to help increase its mission effectiveness while substantially reducing costs. "We simply cannot survive the old way we used to do business any longer; we don't have the money. We have to be innovative, we have to be thinking out of the box. We have to watch what other agencies are doing and bring those things back to CBP," he said.
As budgets continue to shrink, the DHS continues to work on new developments through its research arm, the Homeland Security Advanced Research Projects Agency. The agency is working on a number of efforts, such as big data analysis tools and capabilities to tap into the coming Internet of Things where almost all communications and IT devices, as well as household appliances and automobiles, will communicate with each other, said Stephen Dennis, HSARPA's technical director.
Dennis said HSARPA has 1,200 employees, but attracting and retaining top talent to government jobs is challenging and requires a different kind of workplace. To get that talent, HSARPA's big data project allows its researchers the flexibility to experiment and "get their hands dirty" with the technology in new and innovative ways, he said. The agency also makes use of a variety of university research centers and laboratories to further its work and attract new personnel, he added.
Join us at GTEC, Canada's government technology event. Over 6,000 participants attend GTEC -- Government Technology Exhibition And Conference each year to exchange ideas and advance the business of information and communications technology (ICT) in government. Don't miss thought-provoking keynotes, workshops, panels, seminars, and roundtable discussions on a comprehensive selection of ICT topics presented by leading public sector and industry experts. Register for GTEC with marketing code MPIWKGTEC and save $100 on entire event and conference passes or for a free expo pass. It happens Oct. 27 to 30 in Ottawa.
Henry Kenyon is a contributing writer to InformationWeek Government. He has covered Government IT and Defense markets since 1999 for a variety of publications including Government Computer News, Federal Computer Week, AFCEA's Signal Magazine and AOL Government. View Full Bio
6 Tools to Protect Big DataMost IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.
Big Data Brings Big Security ProblemsWhy should big data be more difficult to secure? In a word, variety. But the business won’t wait to use it to predict customer behavior, find correlations across disparate data sources, predict fraud or financial risk, and more.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.