Tuesday, April 16, 2024

Mixed Reviews For Bush Cybersecurity Draft Plan

Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Industry watchers are divided on whether the White House’ cybersecurity plan has enough muscle to actually make the country’s critical computer networks any safer against a potential terrorist attack.

The Bush administration released a draft copy of the plan this week, calling for critiques and comments from the IT industry, as well as from consumers, over the next two months. After that an official version of the security strategy will be finalized.

But the much-ballyhooed, and long-awaited plan showed up as a list of recommendations — suggestions for companies, IT vendors, consumers and government agencies to tighten their own security. Richard Clarke, the administration’s senior advisor on cybersecurity and Howard Schmidt, the next in line, put the emphasis on voluntary improvements in IT security, saying every American should secure the part of cyberspace that he or she is responsible for.

“There’s no teeth in this thing,” says Dan Woolley, a vice president at Reston, Va.-based SilentRunner Inc., a network security company. “It’s going to be very difficult to get people to move behind it. People are focused on the bottom line…and they’ll look at this and say, ‘That’s nice but who’s going to pay for it?’ This has been heralded as a list of security priorities and how they were going to get done. I don’t see any of that here.”

But others say they’re glad the government isn’t looking to force anything on them.

“The government is telling us that industry and the private sector need to work together,” says Jeff Leeds, director of product marketing at Gilian Technologies Inc., a Web site security firm based in Redwood City, Calif. “Every company out there needs to be thinking about their own cyberspace. They can’t expect the government to do this for them.”

While Woolley isn’t pining for a long string of government regulations that would sap his IT budget dry, he does wish the final version of the plan would have some backbone to it.

“There is a specific role that some branch of government should have responsibility for,” says Woolley. “Nobody is taking ownership. Shouldn’t Congress and government be taking a role in coming up with rules-of-the-road for action and protection? Nobody is putting a stake in the ground and saying that they have the five most important things to be done, we’re going to get them through Congress and here’s where we’re getting the funding for them.”

What the draft does say is that the federal government’s role is that of liaison — facilitating partnerships between the private and public sector, facilitating knowledge sharing between security professionals and fostering awareness and security education.

Government is calling on the IT sector to step up to the plate and take of its own networks, produce more secure products and share information about vulnerabilities, viruses and worms and new tools. Here’s what the cybersecurity plan is asking of IT:

  • Companies should create a corporate security council made up of key members of the company with security-related roles;
  • Require regular, independent IT security audits;
  • Diversify IT service providers;
  • Consider site and staff alternatives;
  • Review continuity plans;
  • Share information on IT security with other companies;
  • Work with the insurance industry to expand the availability of insurance for cyber risks; and
  • Review mainframe security software and procedures.
  • The draft is a good starting point, according to Bob Cohen, senior vice president of the Information Technology Association of America (ITAA), a Virginia-based U.S. IT trade association.

    “We think recommendations are the way to go,” says Cohen. “When you think about information security and the threats out there, it’s a moving target. It’s difficult to regulate in that kind of environment. It’s about being aware. Practicing cyber hygiene.”

    Cohen says he’s not completely happy with the strategy but declined to say which part he is unhappy with.

    Michael Rasmussen, an analyst with Giga Information Group and vice president of marketing for the Information Systems Security Association (ISSA), says this draft will aid network security if it proves to be the first step down a long road. If this strategic plan doesn’t grow into something else, then there will be little to show for the time and money that went into drafting it.

    “It’s a strategy. It’s not a plan,” says Rasmussen, who worked with the ISSA to make contributions to the draft. “The weight is on our government to make a plan out of it. Strategy is nice, but if you have no plan to accomplish the things you’re strategizing, we’re not going to get anywhere.”

    Rasmussen says he expects to see cybersecurity legislation. He also expects that regulator agencies, which oversee economic sectors such as utilities and health care, probably will adopt regulations and mandates of their own.

    “They’re not going to say, ‘Here are regulations for everybody.’ We won’t see broad, sweeping regulations but different regulatory agencies can perhaps take it upon themselves to implement these things in the industries they regulate.”

    Comments can be made about the draft via www.securecyberspace.gov.

    Subscribe to Data Insider

    Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

    Similar articles

    Get the Free Newsletter!

    Subscribe to Data Insider for top news, trends & analysis

    Latest Articles