CIA Unveils Five-Year Strategy PlanCIA Unveils Five-Year Strategy Plan
CIA 2015, released this week, seeks to ensure the agency remains in step with current national security challenges, such as cyber threats
April 27, 2010
The CIA has made investing in technology to prevent and fight cyber threats as one of its three main priorities in a five-year strategic plan unveiled this week.
The move is in line with a government-wide ramp-up in cybersecurity efforts across all agencies that have responsibility for protecting critical infrastructure in the United States, such as the Department of Homeland Security and the National Security Agency.
CIA 2015, released this week, is a three-pillar blueprint for the agency's next five years. The goal of the plan is to ensure that the agency remains in step with current national security challenges, such as cyber threats and so-called "dangerous technology," according to a press statement.
Indeed, industry experts agree that the threat of cyber attacks on the U.S. is on the rise, and a recent survey found that a majority of federal CIOs believe a major attack is imminent. AdTech Ad
The federal government so far has been relatively lax on addressing the threat with policy -- no major cybersecurity legislation is yet in place -- but individual agencies are taking their own steps to invest more in cybersecurity.
In addition to helping increase security in what the agency calls a "rapidly changing global information environment," new technology investments also will extend the CIA's operational and analytic reach and help it become more efficient, the agency said.
Managing the large volume of intelligence data CIA officers and agents must deal with on a day-to-day basis will also be a priority, and the agency plans to purchase and deploy new software for data management, it said.
The other two pillars of CIA 2015 call for the agency to invest in a more highly trained, multilingual staff at home and abroad and to achieve business agility to better maintain a global presence and be better prepared for emergencies. The latter will include a transformation of global support platforms and a consolidation of some business activities, the agency said.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Modernize your Security Operations with Human-Machine Intelligence
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
Business Buyers Guide to Password Managers