CIA Boosting Cybersecurity InvestmentCIA Boosting Cybersecurity Investment
Preventing and fighting cyber threats is one of three priorities in the agency's five-year plan.
April 27, 2010
The CIA has made investing in technology to prevent and fight cyber threats as one of its three main priorities in a five-year strategic plan unveiled this week.
The move is in line with a government-wide ramp-up in cybersecurity efforts across all agencies that have responsibility for protecting critical infrastructure in the United States, such as the Department of Homeland Security and the National Security Agency.
CIA 2015, released this week, is a three-pillar blueprint for the agency's next five years. The goal of the plan is to ensure that the agency remains in step with current national security challenges, such as cyber threats and so-called "dangerous technology," according to a press statement.
Indeed, industry experts agree that the threat of cyber attacks on the U.S. is on the rise, and a recent survey found that a majority of federal CIOs believe a major attack is imminent.
The federal government so far has been relatively lax on addressing the threat with policy -- no major cybersecurity legislation is yet in place -- but individual agencies are taking their own steps to invest more in cybersecurity.
In addition to helping increase security in what the agency calls a "rapidly changing global information environment," new technology investments also will extend the CIA's operational and analytic reach and help it become more efficient, the agency said.
Managing the large volume of intelligence data CIA officers and agents must deal with on a day-to-day basis will also be a priority, and the agency plans to purchase and deploy new software for data management, it said.
The other two pillars of CIA 2015 call for the agency to invest in a more highly trained, multilingual staff at home and abroad and to achieve business agility to better maintain a global presence and be better prepared for emergencies. The latter will include a transformation of global support platforms and a consolidation of some business activities, the agency said.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023