Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/15/2018
05:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Congress Passes Bill to Create New Federal Cybersecurity Agency

Cybersecurity and Infrastructure Security Agency Act now headed to President Trump for signing into law.

A bill that seeks to reorganize the US Department of Homeland Security's National Protection and Programs Directorate (NPPD) into a new cybersecurity agency has cleared Congress and is now headed to President Trump's desk for his signature.

The Cybersecurity and Infrastructure Security Agency Act - which passed the Senate in October and the US House of Representatives this week - essentially re-designates NPPD as the Cybersecurity and Infrastructure Security Agency (CISA).

CISA will be responsible for leading cybersecurity and critical infrastructure protection programs, developing associated policy, and coordinating with federal and private sector entities on security matters. CISA also will be responsible for fulfilling DHS' responsibilities with respect to anti-terrorism standards for chemical facilities.

The new agency will have a Cybersecurity Division, an Infrastructure Security Division, and an Emergency Communications Division. Christopher Krebs, the current NPPD Undersecretary, will head up CISA.

The reorganization will elevate and streamline the cybersecurity mission within DHS while improving the department's ability to engage with government and industry stakeholders, Krebs said in a statement this week. "Giving NPPD a name that reflects what it actually does will help better secure the nation’s critical infrastructure and cyber platforms," he added.

The move to spin out NPPD into a separate, operational cybersecurity agency comes amid growing threats to US critical infrastructure and industry from nation-state adversaries and increasingly sophisticated cybercrime groups. Concerns about adversaries having capabilities to physically damage critical systems and networks and to steal trade secrets and intellectual property from US companies have escalated sharply in recent months. The current geopolitical tensions between the US and countries such as China, Russia, North Korea, and Iran have only exacerbated those concerns.

Same Agency, New Look?

The big question though is whether reorganizing the NPPD into a new agency is going to make much of a difference in the US's ability to address its cybersecurity concerns. "I'm concerned that putting a new face on the old NPPD won't raise performance levels to what the nation needs," says Alan Paller, founder and director of research of the SANS Institute.

There has been something of an internal battle between the NPPD and the DHS' Science & Technology group, which is responsible for researching, developing, testing, and evaluating technologies in support of the DHS mission, Paller notes. So far at least, "the only things that you could point to with impact were coming out of the [S&T] group," he says.

Colin Bastable, CEO of Lucy Security, says the feds instead need an FBI-like organization in charge of cybersecurity for businesses, non-federal assets, and consumers. "The problems that private citizens and private enterprises face from rampant cybercrime are never going to be addressed by the DHS, even wearing its CISA cape," because DHS' primary focus is the federal government, Bastable says.

A federal bureau of cybersecurity would be focused on protecting Americans as consumers and employees, and the businesses that employ them. It would be responsible for investigating and attacking cyber criminal gangs and anticipating cyber threats.

"From a cybersecurity perspective, the DHS is always going to focus on federal infrastructure and major systems," Bastable notes. "It is an amalgamation of 22 agencies and while it has many smart employees, it is never going to be agile enough to combat the cyber threats that we face."

Related Content:

 

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tcritchley07
50%
50%
tcritchley07,
User Rank: Moderator
11/19/2018 | 10:40:42 AM
NPPD Homeland Security
Where does this new body fit in wiht the CNAP initiative, announced in 2016 under the Obama administration?

https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan 

 
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Cognitive Bias Can Hamper Security Decisions
Kelly Sheridan, Staff Editor, Dark Reading,  6/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12855
PUBLISHED: 2019-06-16
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
CVE-2013-7472
PUBLISHED: 2019-06-15
The "Count per Day" plugin before 3.2.6 for WordPress allows XSS via the wp-admin/?page=cpd_metaboxes daytoshow parameter.
CVE-2019-12839
PUBLISHED: 2019-06-15
In OrangeHRM 4.3.1 and before, there is an input validation error within admin/listMailConfiguration (txtSendmailPath parameter) that allows authenticated attackers to achieve arbitrary command execution.
CVE-2019-12840
PUBLISHED: 2019-06-15
In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.
CVE-2019-12835
PUBLISHED: 2019-06-15
formats/xml.cpp in Leanify 0.4.3 allows for a controlled out-of-bounds write in xml_memory_writer::write via characters that require escaping.