01:11 PM

CIA Boosting Cybersecurity Investment

Preventing and fighting cyber threats is one of three priorities in the agency's five-year plan.

The CIA has made investing in technology to prevent and fight cyber threats as one of its three main priorities in a five-year strategic plan unveiled this week.

The move is in line with a government-wide ramp-up in cybersecurity efforts across all agencies that have responsibility for protecting critical infrastructure in the United States, such as the Department of Homeland Security and the National Security Agency.

CIA 2015, released this week, is a three-pillar blueprint for the agency's next five years. The goal of the plan is to ensure that the agency remains in step with current national security challenges, such as cyber threats and so-called "dangerous technology," according to a press statement.

Indeed, industry experts agree that the threat of cyber attacks on the U.S. is on the rise, and a recent survey found that a majority of federal CIOs believe a major attack is imminent.

The federal government so far has been relatively lax on addressing the threat with policy -- no major cybersecurity legislation is yet in place -- but individual agencies are taking their own steps to invest more in cybersecurity.

In addition to helping increase security in what the agency calls a "rapidly changing global information environment," new technology investments also will extend the CIA's operational and analytic reach and help it become more efficient, the agency said.

Managing the large volume of intelligence data CIA officers and agents must deal with on a day-to-day basis will also be a priority, and the agency plans to purchase and deploy new software for data management, it said.

The other two pillars of CIA 2015 call for the agency to invest in a more highly trained, multilingual staff at home and abroad and to achieve business agility to better maintain a global presence and be better prepared for emergencies. The latter will include a transformation of global support platforms and a consolidation of some business activities, the agency said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio