Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/15/2018
05:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Congress Passes Bill to Create New Federal Cybersecurity Agency

Cybersecurity and Infrastructure Security Agency Act now headed to President Trump for signing into law.

A bill that seeks to reorganize the US Department of Homeland Security's National Protection and Programs Directorate (NPPD) into a new cybersecurity agency has cleared Congress and is now headed to President Trump's desk for his signature.

The Cybersecurity and Infrastructure Security Agency Act - which passed the Senate in October and the US House of Representatives this week - essentially re-designates NPPD as the Cybersecurity and Infrastructure Security Agency (CISA).

CISA will be responsible for leading cybersecurity and critical infrastructure protection programs, developing associated policy, and coordinating with federal and private sector entities on security matters. CISA also will be responsible for fulfilling DHS' responsibilities with respect to anti-terrorism standards for chemical facilities.

The new agency will have a Cybersecurity Division, an Infrastructure Security Division, and an Emergency Communications Division. Christopher Krebs, the current NPPD Undersecretary, will head up CISA.

The reorganization will elevate and streamline the cybersecurity mission within DHS while improving the department's ability to engage with government and industry stakeholders, Krebs said in a statement this week. "Giving NPPD a name that reflects what it actually does will help better secure the nation’s critical infrastructure and cyber platforms," he added.

The move to spin out NPPD into a separate, operational cybersecurity agency comes amid growing threats to US critical infrastructure and industry from nation-state adversaries and increasingly sophisticated cybercrime groups. Concerns about adversaries having capabilities to physically damage critical systems and networks and to steal trade secrets and intellectual property from US companies have escalated sharply in recent months. The current geopolitical tensions between the US and countries such as China, Russia, North Korea, and Iran have only exacerbated those concerns.

Same Agency, New Look?

The big question though is whether reorganizing the NPPD into a new agency is going to make much of a difference in the US's ability to address its cybersecurity concerns. "I'm concerned that putting a new face on the old NPPD won't raise performance levels to what the nation needs," says Alan Paller, founder and director of research of the SANS Institute.

There has been something of an internal battle between the NPPD and the DHS' Science & Technology group, which is responsible for researching, developing, testing, and evaluating technologies in support of the DHS mission, Paller notes. So far at least, "the only things that you could point to with impact were coming out of the [S&T] group," he says.

Colin Bastable, CEO of Lucy Security, says the feds instead need an FBI-like organization in charge of cybersecurity for businesses, non-federal assets, and consumers. "The problems that private citizens and private enterprises face from rampant cybercrime are never going to be addressed by the DHS, even wearing its CISA cape," because DHS' primary focus is the federal government, Bastable says.

A federal bureau of cybersecurity would be focused on protecting Americans as consumers and employees, and the businesses that employ them. It would be responsible for investigating and attacking cyber criminal gangs and anticipating cyber threats.

"From a cybersecurity perspective, the DHS is always going to focus on federal infrastructure and major systems," Bastable notes. "It is an amalgamation of 22 agencies and while it has many smart employees, it is never going to be agile enough to combat the cyber threats that we face."

Related Content:

 

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tcritchley07
50%
50%
tcritchley07,
User Rank: Moderator
11/19/2018 | 10:40:42 AM
NPPD Homeland Security
Where does this new body fit in wiht the CNAP initiative, announced in 2016 under the Obama administration?

https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan 

 
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
6 Top Nontechnical Degrees for Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/21/2019
Anatomy of a BEC Scam
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11287
PUBLISHED: 2019-11-23
Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header ca...
CVE-2019-11291
PUBLISHED: 2019-11-22
Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user w...
CVE-2019-15593
PUBLISHED: 2019-11-22
GitLab 12.2.3 contains a security vulnerability that allows a user to affect the availability of the service through a Denial of Service attack in Issue Comments.
CVE-2019-16285
PUBLISHED: 2019-11-22
If a local user has been configured and logged in, an unauthenticated attacker with physical access may be able to extract sensitive information onto a local drive.
CVE-2019-16286
PUBLISHED: 2019-11-22
An attacker may be able to bypass the OS application filter meant to restrict applications that can be executed by changing browser preferences to launch a separate process that in turn can execute arbitrary commands.