[ISN] The United States' battle to secure cyberspace

From: InfoSec News (isn@private)
Date: Wed Jan 26 2005 - 23:27:36 PST


http://news.com.com/The+United+States+battle+to+secure+cyberspace/2008-1082_3-5550064.html

By Robert Lemos 
Staff Writer, CNET News.com
January 26, 2005

Robert Liscouski doesn't hesitate to explain why he's leaving the 
Department of Homeland Security: He pledged two years, and time's up. 

Liscouski thus becomes the latest high-ranking cybersecurity official 
to leave the DHS, where protecting the U.S. information infrastructure 
made up only part of his duties. 

But Liscouski, formerly the chief information officer for the 
Coca-Cola Company, says this is not another sign of the disarray 
alleged by DHS detractors. What's more, he believes the department has 
received a bad rap from critics who claim the DHS has done little to 
protect cyberspace. CNET News.com spoke with Liscouski about the DHS's 
commitment to cybersecurity, the criticisms of the agency and why the 
DHS resembles nothing so much as a high-pressure start-up--albeit 
without stock options. 


Q: There's been criticism from the technology industry that the Bush 
administration hasn't moved fast enough in implementing the national 
strategy. How do you respond?

Put the criticism aside and take a look at what we've done. 

There was no organization responsible for cybersecurity prior to the 
DHS, and within less than two years we not only created an 
organization which is specifically responsible for information 
technology and cybersecurity, but we went from an aggregated budget of 
about $10 million to $80 million. We've got the National Cyber Alert 
System, which was launched this last year, which is delivering 
information to American secured computer systems, and we've got 
270,000 direct subscribers there. We've increased situational 
awareness in the cybercommunity through the US-CERT Web site. We've 
established a cybersecurity readiness and response system, which is a 
24-7 system, which is effectively responsible for tracking incident 
and trend data....We disseminate US-CERT data through classified 
briefings. 

I can go through the entire list of accomplishments, but I would say 
we've done a very good job and it's all user-focused. 


The industry allied with the government to create the National Cyber 
Security Partnership and then came up with five different working 
groups, which issued reports. But we have seen little else from them 
since. Has private industry participation stalled?

No. Actually, I would argue that the private sector is working well 
with the department. I've looked at what the task force working groups 
have done so far. Software assurance and governance working groups in 
particular have done a tremendous job. 

We've got more to do, no question about it. But you know, we've got 
engagement; we've got good leadership there....It's a classic case of 
you can't just rush that process quicker by adding more people and 
more resources. Some things do take time to implement. 


People are more worried about the physical threats than cyberthreats. 
Do you think that's going to change in the future and that 
cybersecurity will be a bigger part of the equation? Or do you think 
the mix we have right now is about right?

Well, I think you are making an assumption that your perception is 
correct. I would challenge you on that. I would suggest that you're 
seeing the most visual things, such as the police out in force with 
all sorts of SWAT gear standing in front of buildings. Because of the 
visual aspect, you see our reaction to a threat--checkpoints and a lot 
of things that would make a much better media visual then talking 
about cybersecurity. 

I don't necessarily agree that we've only been focusing on the 
physical side. But I would tell you that the dominant threat that we 
face today is a physical threat versus a cyberthreat in terms of where 
al-Qaida is focusing, and al-Qaida is still the predominant threat 
that we look at. But that's not at the exclusion of the other 
cyberthreats. 


Such as? 

There are plenty of examples where cyberattacks have manifested 
themselves and they have not been a threat. We've taken coordinated 
action, working with our partners in the federal sector to mitigate 
the attack, investigate the attack and get awareness about what's 
going on. It just doesn't create the visual that the physical side 
does. 

So you know, when we talk about one dominating the other, much of that 
has to do with the fact that we are somewhat driven at a tactical 
level by the threats that we face, and we're not going to let another 
9-11 happen. But we're surely not going to turn a blind eye to 
cyberspace so we can have a 9-11 version of a cyberwar. We've got a 
very active and very aggressive approach there. I think it's just not 
fair to represent one as dominating the other. 


What remains to be done?

I actually employed software (while) working for a Fortune 50 company, 
and I would tell you that my biggest push was getting the vendors to 
make sure that they are going to give us solid, workable software that 
I could rely upon. 

While the industry is criticizing the government, they are not vocal 
about their own issues. To suggest that this monkey is only on the 
government's back takes some pressure off the private sector. But it 
doesn't do the user community any service because nobody is looking 
out for them. I see that as our job. 

I'm going to continue to push that agenda outside the government as 
well as inside the government. I think you're going to see more about 
the user community being the emphasis and more focus on getting 
educated and becoming more aware. 


There has been a lot of turnover within the cybersecurity side of the 
DHS. Lawrence Hale is leaving. Amit Yoran has left. And it goes back 
to Richard Clarke, who left a comparable post just before the DHS was 
formed. Is that indicative of some sort of difficulty on the 
cybersecurity side?

It's regular government turnover. I would say some of those in the 
industry who are getting more vocal would argue that the turnover 
indicates a problem. But many of these people have put their time in. 
Part of it is, I need more senior positions to which I can promote 
people to reward their hard work. I cannot compete with the private 
sector in keeping good people. 

Lawrence Hale is a very bright guy, a very talented guy, and he's put 
in 24 years. Amit told us he would give us a solid year. He's a good 
guy, and he gave it a shot, and we got a year. 

In my case, I committed to (being assistant) secretary, when I came on 
board back in February 2003, for two solid years. You know these jobs 
are hard. When you've done a start-up environment--and you know what 
the hours are and how hard the pace is--(you know) that particularly 
in a constantly changing environment in which you have to keep your 
pressure on for execution, you have transitions. I pretty much 
fulfilled my commitment to the secretary and had always desired to 
move back to the private sector. 

This is basically a start-up organization in which the pressure here 
is as intense as it is anywhere else in the private sector. Let 
somebody else have as much fun as I have. 



_________________________________________
Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/



This archive was generated by hypermail 2.1.3 : Thu Jan 27 2005 - 02:05:36 PST