Feeds

Task force aims to improve US cybersecurity

'This is not a tech focus; it is a Washington focus'

The Power of One eBook: Top reasons to choose HP BladeSystem

A blue-ribbon panel of three dozen security experts hopes to craft a strategy to improve the United States' cybersecurity by the time the next president takes office, the Center for Strategic and International Studies (CSIS), and the task force's Congressional sponsors, announced on Tuesday.

The bipartisan Commission on Cyber Security for the 44th Presidency will be tasked with creating a plan to secure the nation's computers and critical infrastructure and presenting that plan to the next president. The task force is headed by Representatives Jim Langevin (D-RI) and Michael McCaul (R-TX), Microsoft's vice president for Trustworthy Computing Scott Charney and retired Navy admiral Bobby Inman.

The commission will have at least four major meetings over the next year to hash out an agenda, investigate the issues and make recommendations, James Lewis, senior fellow at the Center for Strategic and International Studies (CSIS), which is funding the commission.

"This is not a tech focus; it is a Washington focus," Lewis said. "You always have an opportunity, when a new administration comes in, to do some quick fixes and that is what we are trying to do with this commission."

Cybersecurity has not been a major priority for past administrations. In 1998, President Clinton signed Presidential Decision Directive No. 63, which required agencies to take steps to protect eight critical infrastructures.

In 2000, the Clinton Administration unveiled its National Plan to Protect Critical Infrastructure, but failed to fund critical programs to push federal agencies to secure their systems.

While many of those agencies have slowly improved their security compliance scores under the Federal Information System Management Act (FISMA) of 2002, the Bush Administration has also largely failed to create strong recommendations or requirements to improve cybersecurity.

This year, the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology has taken an increasing interest in federal agencies' failure to protect themselves against online attacks.

The Department of State acknowledged in June 2006 that attackers had installed remote access software on systems in the agency and abroad, stolen passwords and targeted information on China and North Korea. In October 2006, the Department of Commerce took hundreds of computers offline following a series of attacks aimed at federal employees' computer accounts by online thieves that appear to be based in China.

"I believe the government, across all levels, is too complacent when it comes to protecting their digital assets and this needs to change,” commission co-chair Rep. Langevin, who also heads the Homeland Security Subcommittee on Emerging Threats, Cyber Security and Science and Technology, said in a statement.

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.