Forwarded from: William Knowles <wkat_private> http://www.infoworld.com/article/03/06/26/HNcybersecure_1.html By Paul Roberts IDG News Service June 26, 2003 The atmosphere in the new U.S. Department of Homeland Security (DHS) is one of chaotic energy, akin to a "dot com," but the new agency will need a more business-like approach to successfully fight terrorism, according to Robert Liscouski, Assistant Secretary of Homeland Security. Liscouski was in Framingham, Mass., Thursday, speaking with members of the press and discussing the government's plans to fight cyberterrorism and protect the nation's critical infrastructure. As the Assistant Secretary for Homeland Security for Infrastructure Protection in the Information Analysis and Infrastructure Protection Directorate (IAIP), Liscouski is responsible for overseeing programs to secure the nation's critical infrastructure and core services, including the DHS's new cybersecurity division. Liscouski said that the DHS must first answer fundamental questions about its mission and many functions such as "What business are we in?" and "Is this the right business to be in?" Like a business, the DHS must define both short- and long term objectives, be willing to experiment with different techniques on a small scale and react quickly to large disruptions such as the emergence of new threats or further terrorist attacks. Fit and tanned, wearing pressed slacks and a casual, short sleeve shirt, Liscouski looked more like an executive who just wrapped up 18 holes of golf than a government employee within the leviathan DHS. With extensive experience in law enforcement and the private sector, including a stint as Director of Information Assurance for The Coca-Cola, Liscouski expressed skepticism about the big-program approach favored by federal agencies. "My motto is 'Think big, act small, scale fast,'" Liscouski said. Such an approach will help in the battle against terrorism, where the government has to learn to "think like terrorists" in order to anticipate attacks and be quick to respond to new threats and attacks, he said. The emphasis on private sector strategies was a recurrent theme for Liscouski throughout the hour-long question and answer session. On the issue of whether the government should mandate that corporations owning critical infrastructure comply with federal security standards, Liscouski came down hard on the side of voluntary compliance with industry "best practices" instead of government oversight. Liscouski called audits for compliance with regulations "post facto" events and questioned the efficacy of recent efforts at regulation such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Passing audits doesn't make organizations secure, he said. Noting that 80 percent of the nation's critical infrastructure is in private hands, Liscouski said that the private sector "owns" the problem of securing it and should be allowed to develop its own solutions to the problem with help and guidance from the federal government . Instead of standards, the government should offer incentives to industry to encourage the adoption of secure practices and technology, he said. Liscouski also weighed in on the heated debate about whether the Bush Administration is giving short shrift to the issue of cybersecurity. The DHS's cybersecurity division is still without a chief after being taken out of the White House and placed far down in the IAIP hierarchy. Some industry experts have said that demoting the function sent a message that cybersecurity was not a priority for the Administration. While cybersecurity is a critical component of the critical infrastructure, placing the cybersecurity function higher up within the DHS would create a "dysfunctional" atmosphere by separating IT infrastructure from other kinds of critical infrastructure, Liscouski said. "You've got to have a holistic approach," he said. On the issue of vulnerability disclosures, Liscouski said that the IAIP will "enhance" its relationship with the CERT Coordination Center and look for ways to reach out to software companies and security researchers and encourage responsible disclosure practices. Among other things, Liscouski said he favored the Freedom Of Information Act exemption for critical infrastructure information in the bill creating the DHS, saying there had to be a balance between the public's need to know about security vulnerability and protecting the proprietary interests of software makers. "In order to get companies to share vulnerability information, we have to engender trust," he said. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* - ISN is currently hosted by Attrition.org To unsubscribe email majordomoat_private with 'unsubscribe isn' in the BODY of the mail.
This archive was generated by hypermail 2b30 : Fri Jun 27 2003 - 01:47:42 PDT