Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/15/2018
05:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Congress Passes Bill to Create New Federal Cybersecurity Agency

Cybersecurity and Infrastructure Security Agency Act now headed to President Trump for signing into law.

A bill that seeks to reorganize the US Department of Homeland Security's National Protection and Programs Directorate (NPPD) into a new cybersecurity agency has cleared Congress and is now headed to President Trump's desk for his signature.

The Cybersecurity and Infrastructure Security Agency Act - which passed the Senate in October and the US House of Representatives this week - essentially re-designates NPPD as the Cybersecurity and Infrastructure Security Agency (CISA).

CISA will be responsible for leading cybersecurity and critical infrastructure protection programs, developing associated policy, and coordinating with federal and private sector entities on security matters. CISA also will be responsible for fulfilling DHS' responsibilities with respect to anti-terrorism standards for chemical facilities.

The new agency will have a Cybersecurity Division, an Infrastructure Security Division, and an Emergency Communications Division. Christopher Krebs, the current NPPD Undersecretary, will head up CISA.

The reorganization will elevate and streamline the cybersecurity mission within DHS while improving the department's ability to engage with government and industry stakeholders, Krebs said in a statement this week. "Giving NPPD a name that reflects what it actually does will help better secure the nation’s critical infrastructure and cyber platforms," he added.

The move to spin out NPPD into a separate, operational cybersecurity agency comes amid growing threats to US critical infrastructure and industry from nation-state adversaries and increasingly sophisticated cybercrime groups. Concerns about adversaries having capabilities to physically damage critical systems and networks and to steal trade secrets and intellectual property from US companies have escalated sharply in recent months. The current geopolitical tensions between the US and countries such as China, Russia, North Korea, and Iran have only exacerbated those concerns.

Same Agency, New Look?

The big question though is whether reorganizing the NPPD into a new agency is going to make much of a difference in the US's ability to address its cybersecurity concerns. "I'm concerned that putting a new face on the old NPPD won't raise performance levels to what the nation needs," says Alan Paller, founder and director of research of the SANS Institute.

There has been something of an internal battle between the NPPD and the DHS' Science & Technology group, which is responsible for researching, developing, testing, and evaluating technologies in support of the DHS mission, Paller notes. So far at least, "the only things that you could point to with impact were coming out of the [S&T] group," he says.

Colin Bastable, CEO of Lucy Security, says the feds instead need an FBI-like organization in charge of cybersecurity for businesses, non-federal assets, and consumers. "The problems that private citizens and private enterprises face from rampant cybercrime are never going to be addressed by the DHS, even wearing its CISA cape," because DHS' primary focus is the federal government, Bastable says.

A federal bureau of cybersecurity would be focused on protecting Americans as consumers and employees, and the businesses that employ them. It would be responsible for investigating and attacking cyber criminal gangs and anticipating cyber threats.

"From a cybersecurity perspective, the DHS is always going to focus on federal infrastructure and major systems," Bastable notes. "It is an amalgamation of 22 agencies and while it has many smart employees, it is never going to be agile enough to combat the cyber threats that we face."

Related Content:

 

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tcritchley07
50%
50%
tcritchley07,
User Rank: Moderator
11/19/2018 | 10:40:42 AM
NPPD Homeland Security
Where does this new body fit in wiht the CNAP initiative, announced in 2016 under the Obama administration?

https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan 

 
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9405
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated reflected XSS via the redirect page.
CVE-2020-9406
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated eval injection via the queryBCP method of the Auxiliary Service.
CVE-2020-9407
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows attackers to obtain sensitive information by reading the IWEBSERVICE_JSONRPC_COOKIE cookie.
CVE-2020-9398
PUBLISHED: 2020-02-25
ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection.
CVE-2015-5201
PUBLISHED: 2020-02-25
VDSM and libvirt in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H) 7-7.x before 7-7.2-20151119.0 and 6-6.x before 6-6.7-20151117.0 as packaged in Red Hat Enterprise Virtualization before 3.5.6 when VSDM is run with -spice disable-ticketing and a VM is suspended and then restored, allows r...