Home / Blogs

OMB Focuses On Cybersecurity

Ensuring federal cybersecurity is essential to protecting national security. According to some media reports, recommendations have been made to the Bush Administration to “create a distinct administrative cybersecurity position within the Homeland Security Department to oversee progress in the federal government and act as a liaison with private industry.” However, before new bureaucracy is created, it is important to recognize the practical cybersecurity policies and projects that are already being undertaken by the Administration.

Of particular importance, the White House Office of Management and Budget (OMB) is requiring all federal agencies to factor cybersecurity costs into their budget requests and to only undertake information technology projects that adequately address cybersecurity.

Karen Evans, Administrator of OMB’s Office of E-Government and Information Technology, was recently quoted as saying, “Cybersecurity costs are expected to be factored into all agency budget requests. It’s a matter the administration takes seriously enough that the Office of Management and Budget suggests agencies without adequate plans to improve cybersecurity shouldn’t move to any new IT projects until cybersecurity is addressed.”

Every federal agency has one or more roles to play in promoting cybersecurity. For some agencies, their primary cybersecurity goal will be to protect the agency’s IT components. Other agencies, including OMB, will also have broader missions with regard to cybersecurity. Ensuring that all of these various cybersecurity functions are performed properly is clearly an Administration priority.

In addition to the federal government, all other stakeholders including industry, State and local governments, and international organizations will also need to take pro-active measures to enhance cybersecurity. ICANN’s draft Strategic Plan appropriately lists internet security and stability as their first strategic priority. Of course, no single entity, policy or technology can protect IT security. However, ensuring appropriate technical management of the internet needs to be an integral component of any comprehensive plan for promoting cybersecurity.

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global