<node id="498021">
  <nid>498021</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1455104433</created>
  <changed>1475896838</changed>
  <title><![CDATA[Statement re: White House Cybersecurity National Action Plan]]></title>
  <body><![CDATA[<p>President Barack Obama’s budget proposal for fiscal 2017, unveiled yesterday, brings a welcome <a href="http://www.reuters.com/article/us-obama-budget-cyber-idUSKCN0VI0R1" target="_blank">35 percent increase for cybersecurity</a>. As part of <a href="https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan" target="_blank">the plan</a>, the creation of a federal Chief Information Security Officer (CISO) also was announced to parallel what most major organizations already do to coordinate information security and risk. Yet the devil will be in the details for this new spending and new position.</p><p>Will the United States' CISO have any real authority? Will the new hardware and software bought with these funds be as insecurely configured or poorly implemented as the current systems? Two weeks ago&nbsp;Rob Joyce, chief of the NSA's Tailored Access Operations (TAO), publicly reminded defenders that attackers know what actually is on a target network, whereas agency leaders often only think they know their own information environment. What should be and what is are often different, and this delta is usually the most fertile area of the attack surface.</p><p>This additional funding should be applied in two ways, first addressing the present and second looking to the future:</p><p>1)&nbsp;&nbsp;&nbsp; Compel federal government agencies to prove they are doing the basics:</p><ul><li>inventory authorized and unauthorized devices (know what you’ve got)</li><li>inventory authorized and unauthorized software (know what it’s running)</li><li>reduce and control use of admin privileges</li><li>read your logs (yes, really read them!)</li><li>establish secure configs for all apps and devices, roll this out, don’t deviate, and patch it aggressively.</li></ul><p>None of this is new, but actually doing it consistently would be novel for much of the U.S. government.&nbsp; The new CISO and cognizant officials can’t keep admiring the problem, but actually must measure progress and hold poor performance accountable.</p><p>2)&nbsp;&nbsp;&nbsp; Fund research and development for cybersecurity across disciplinary lines – computer science, engineering, policy, etc:</p><ul><li>Attribution of cyberthreats</li><li>Consumer-facing privacy</li><li>Cyber-physical systems</li></ul><p>Reward those working on hard problems and seek revolutionary gains.&nbsp; Don’t be afraid to fail.&nbsp; Create the next!&nbsp;</p><p><em>Michael Farrell is chief scientist for the Cyber Technology &amp; Information Security Lab (CTISL) and associate director of attribution for the Institute for Information Security &amp; Privacy (IISP) at Georgia Tech.</em></p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2016-02-10T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Associate Director Michael Farrell provides a public statement on behalf of the Institute for Information Security & Privacy.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>President Barack Obama’s budget proposal for fiscal 2017 includes a <a href="http://www.reuters.com/article/us-obama-budget-cyber-idUSKCN0VI0R1" target="_blank">35 percent increase for cybersecurity</a>, creating a new "Cybersecurity National Action Plan." Georgia Tech's Michael Farrell, associate director of attribution for the Institute for Information Security &amp; Privacy, explains what that should mean and provide.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="492491">
            <nid>492491</nid>
            <type>image</type>
            <title><![CDATA[IISP - required security poster]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>205850</fid>
                  <filename><![CDATA[required_security.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/required_security.jpg]]></filepath>
                  <file_full_path><![CDATA[http://tlwarc.hg.gatech.edu//sites/default/files/images/required_security.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[IISP - required security poster]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>6467</tid>
        <value><![CDATA[Barack Obama]]></value>
      </item>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>90001</tid>
        <value><![CDATA[federal budget]]></value>
      </item>
          <item>
        <tid>146931</tid>
        <value><![CDATA[The White House]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
