US government wants to sharply increase spending on cybersecurity

Cyberthreats continue to outpace new defenses, a top official said

President Barack Obama on Tuesday will propose a sharp increase in cybersecurity spending for next year's budget, to improve outdated government software and promote better online security for consumers.

The plan calls for a US$3.1 billion fund to replace outdated IT infrastructure; a new position of federal chief information security officer; a commission to study cybersecurity problems, and a program to recruit cybersecurity experts into government roles.

The U.S has been working since 2009 to improve the nation's cyber defenses, most recently with the Cybersecurity Act of 2015, which promotes better information sharing between private industry and government, said Michael Daniel, special assistant to the President and cybersecurity coordinator, in a phone briefing with reporters Monday.

"Despite this track record, the cyberthreat continues to outpace our current efforts," he said. "Particularly as we continue to hook more and more of our critical infrastructure up to the Internet, and as we build out the Internet of things, cyberthreats become only more frequent and more serious."

The U.S. has faced serious data breaches and intrusions over the past two years. An attack on the Office of Personnel Management, the federal personnel agency, resulted in the theft of data including Social Security numbers, and in some cases fingerprints, of 21.5 million people.

In November 2014, the State Department took its unclassified email system offline after it detected suspicious activity. The shutdown came just two weeks after the White House reported unusual activity on the unclassified Executive Office of the President network.

Overall, the government wants to allocate $19 billion for cybersecurity spending in fiscal 2017, a 35 percent increase over the current year.

The proposed $3.1 billion Information Technology Modernization Fund would be used to replace systems that pose a high risk and to investigate more modern architectures, such as cloud services.

"We have a broad surface area of old, outdated technology that's hard to secure, expensive to operate and, on top of all that, the skill sets needed to maintain those systems are disappearing rather rapidly," Tony Scott, the U.S. chief information security officer, said during the briefing.

The fund requires approval from the U.S. Congress. Much of the plan could be initiated using the president's executive authority, Daniel said, but the administration plans to work closely with Congress.

"This plan really is as aggressive as we can get under existing authority, and we can do quite a bit of it without the additional resources," he said.

The plans also call for $62 million in programs, grants and scholarships to encourage graduates with the right skills to take government cybersecurity positions. The strong demand for cybersecurity professionals, and higher salaries offered elsewhere, make government positions less attractive.

Other parts of the strategy include a Cybersecurity National Action Plan (CNAP), which will aim to help consumers better protect themselves on the Internet. One of CNAP's goals is better security through wider use of two-factor authentication, said Ed Felton, deputy U.S. chief technology officer. Two-factor authentication requires a person logging into a service to enter another piece of information, such as a one-time passcode sent via SMS, in addition to their username and password.

A second area will be to strengthen core Internet technologies, Felton said, including open source software, standards related to Internet routing and the Network Time Protocol. The government will also work with the Linux Foundation's Core Infrastructure Initiative, formed in 2014 to identify widely used open-source projects in need of extra support.

"Just as the roads and bridges and physical infrastructure need regular repair and upkeep, the same is true of the technical linkages that allow the information superhighway to keep flowing," Felton said.

Join the CSO newsletter!

Error: Please check your email address.

More about LinuxTechnology

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts