SlideShare a Scribd company logo
1 of 6
IMPROVING CYBERSECURITY AND RESILIENCE 
THROUGH ACQUISITION 
Implementation of the Final Report of the 
Department of Defense and 
General Services Administration 
Emile Monette, GSA Office of Mission Assurance 
23 Oct 2014
Acquisition Reform is Part of the Answer 
 When the government purchases products or services with 
inadequate in-built “cybersecurity,” the risks created persist 
throughout the lifespan of the item purchased. The lasting effect of 
inadequate cybersecurity in acquired items is part of what makes 
acquisition reform so important to achieving cybersecurity and 
resiliency. 
 Currently, government and contractors use varied and nonstandard 
practices, which make it difficult to consistently manage and 
measure acquisition cyber risks across different organizations. 
 Executive Order 13636 and Presidential Policy Directive 21, issued 
concurrently in February, 2013, require the agencies to take an 
integrated approach to cybersecurity through a variety of channels, 
including Federal acquisition. 
1
Executive Order 13636 
 On February 12, 2013, the President issued an Executive 
Order for “Improving Critical Infrastructure Cybersecurity,” 
directing Federal agencies to provide stronger protections 
for cyber-based systems that are critical to national and 
economic security. 
 Section 8(e) of the EO required GSA and DoD, in 
consultation with DHS and the FAR Council: 
Within 120 days of the date of this order, the Secretary of Defense and the Administrator 
of General Services, in consultation with the Secretary and the Federal Acquisition 
Regulatory Council, shall make recommendations to the President, through the Assistant 
to the President for Homeland Security and Counterterrorism and the Assistant to the 
President for Economic Affairs, on the feasibility, security benefits, and relative merits of 
incorporating security standards into acquisition planning and contract administration. The 
report shall address what steps can be taken to harmonize and make consistent existing 
procurement requirements related to cybersecurity.” 
2
Joint Working Group 
 The “Joint Working Group on Improving Cybersecurity and Resilience 
through Acquisition,” was formed to prepare the Section 8(e) Report 
 Core group comprised of topic-knowledgeable individuals representing 
broad expertise in information security and acquisition disciplines 
selected from: 
 DoD: USD-AT&L (DPAP, SE, C3CB), DoD-CIO, DISA, DIA 
 GSA: OMA, FAS (ITS/SSD), OCIO, OGP (ME, MV), OGC, OCSIT, PBS 
 DHS: NPPD (CS&C), USM (OCPO, OSA) 
 Commerce: NIST 
 EOP: OMB (OSTP, OFPP), NSC 
 120-day collaborative effort with high level of stakeholder input 
– Over 60 individual engagements 
 Industry Associations, Critical Infrastructure Partnership Advisory Council Sector 
Coordinating Councils, individual large and small companies, media interviews 
– Federal Register Notice – 28 comments received (closed June 2013) 
3
Section 8(e) Report 
 The Final Report, "Improving Cybersecurity and Resilience through 
Acquisition," was publicly released January 23, 2014: 
(http://gsa.gov/portal/content/176547) 
 Recommends six acquisition reforms: 
I. Institute Baseline Cybersecurity Requirements as a Condition of Contract 
Award for Appropriate Acquisitions 
II. Address Cybersecurity in Relevant Training 
III. Develop Common Cybersecurity Definitions for Federal Acquisitions 
IV. Institute a Federal Acquisition Cyber Risk Management Strategy 
V. Include a Requirement to Purchase from Original Equipment Manufacturers, 
Their Authorized Resellers, or Other “Trusted” Sources, Whenever 
Available, in Appropriate Acquisitions 
VI. Increase Government Accountability for Cyber Risk Management 
Ultimate goal of the recommendations is to strengthen the federal 
government’s cybersecurity by improving management of the people, 
processes, and technology affected by the Federal Acquisition System 
4
Next Steps 
 Working Group leads: 
1. Institute Baseline Cybersecurity Requirements as a Condition of Contract Award for 
Appropriate Acquisitions 
- Don Davidson, OSD/CIO donald.r.davidson4.civ@mail.mil 
2. Address Cybersecurity in Relevant Training 
- Andre Wilkins, DHS/HSAI andre.wilkins@hq.dhs.gov 
3. Develop Common Cybersecurity Definitions for Federal Acquisitions 
- Jon Boyens, NIST jon.boyens@nist.gov 
4. Institute a Federal Acquisition Cyber Risk Management Strategy 
- Don Johnson, OUSD/AT&L donald.b.johnson1.civ@mail.mil 
5. Include a Requirement to Purchase from Original Equipment Manufacturers, Their 
Authorized Resellers, or Other “Trusted” Sources, Whenever Available, in Appropriate 
Acquisitions 
- Emile Monette, GSA/OMA emile.monette@gsa.gov 
6. Increase Government Accountability for Cyber Risk Management 
- Joe Jarzombek, DHS/NPPD/CS&C Joe.Jarzombek@hq.dhs.gov 
 Working Group will continue stakeholder-centric process 
 Federal Register Requests for Comment 
 Conferences, symposia, meetings, media 
 Iterative implementation, linked to existing rules / practices 
 Focus on mission/function prioritization and criticality to assess risk 5

More Related Content

What's hot

Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Ignyte Assurance Platform
 
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteMidway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Ignyte Assurance Platform
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 

What's hot (20)

GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteMidway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 

Similar to Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigate and Minimize the Damage: Improving Cybersecurity and Resilience Through Acquisition

The Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookThe Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_book
JAMES E. McDONALD, PSNA
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
Phil Agcaoili
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
bagotjesusa
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
Lee Dalton
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
Dominic Karunesudas
 
The physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdfThe physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdf
venkt12345
 

Similar to Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigate and Minimize the Damage: Improving Cybersecurity and Resilience Through Acquisition (20)

Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
The Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookThe Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_book
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
Improving cyber-security through acquisition
Improving cyber-security through acquisitionImproving cyber-security through acquisition
Improving cyber-security through acquisition
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...
 
FED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FARFED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FAR
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
The physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdfThe physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdf
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 

More from Government Technology and Services Coalition

GTSC June 2013 - November 2014 Annual Report
GTSC June 2013 - November 2014 Annual ReportGTSC June 2013 - November 2014 Annual Report
GTSC June 2013 - November 2014 Annual Report
Government Technology and Services Coalition
 

More from Government Technology and Services Coalition (20)

GTSC 5th Anniversary Annual Report: Steady in a Sea of Change
GTSC 5th Anniversary Annual Report:  Steady in a Sea of ChangeGTSC 5th Anniversary Annual Report:  Steady in a Sea of Change
GTSC 5th Anniversary Annual Report: Steady in a Sea of Change
 
Government Technology & Services Coalition 2015 Annual Report
Government Technology & Services Coalition 2015 Annual ReportGovernment Technology & Services Coalition 2015 Annual Report
Government Technology & Services Coalition 2015 Annual Report
 
GTSC Annual Meeting 2014: Michelle Mrdeza: What to Expect When You Are Expect...
GTSC Annual Meeting 2014: Michelle Mrdeza: What to Expect When You Are Expect...GTSC Annual Meeting 2014: Michelle Mrdeza: What to Expect When You Are Expect...
GTSC Annual Meeting 2014: Michelle Mrdeza: What to Expect When You Are Expect...
 
GTSC Annual Meeting 2014: Chani Wiggins: 114th Congress: Big Picture
GTSC Annual Meeting 2014: Chani Wiggins: 114th Congress: Big PictureGTSC Annual Meeting 2014: Chani Wiggins: 114th Congress: Big Picture
GTSC Annual Meeting 2014: Chani Wiggins: 114th Congress: Big Picture
 
GTSC Annual Meeting 2014: BD Exchange
GTSC Annual Meeting 2014: BD ExchangeGTSC Annual Meeting 2014: BD Exchange
GTSC Annual Meeting 2014: BD Exchange
 
GTSC June 2013 - November 2014 Annual Report
GTSC June 2013 - November 2014 Annual ReportGTSC June 2013 - November 2014 Annual Report
GTSC June 2013 - November 2014 Annual Report
 
Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...
Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...
Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...
 
Antwayne Johnson: Alert/Notification Technologies: The Integrated Public Aler...
Antwayne Johnson: Alert/Notification Technologies: The Integrated Public Aler...Antwayne Johnson: Alert/Notification Technologies: The Integrated Public Aler...
Antwayne Johnson: Alert/Notification Technologies: The Integrated Public Aler...
 
Justin Chiarodo: Government Contracts & Insurance Issues: How Prepared is You...
Justin Chiarodo: Government Contracts & Insurance Issues: How Prepared is You...Justin Chiarodo: Government Contracts & Insurance Issues: How Prepared is You...
Justin Chiarodo: Government Contracts & Insurance Issues: How Prepared is You...
 
Todd Jasper: How Can We Leverage Technology to Improve Performance: Social Me...
Todd Jasper: How Can We Leverage Technology to Improve Performance: Social Me...Todd Jasper: How Can We Leverage Technology to Improve Performance: Social Me...
Todd Jasper: How Can We Leverage Technology to Improve Performance: Social Me...
 
Kevin Delin: How Can We Leverage Technology to Improve Performance: The Senso...
Kevin Delin: How Can We Leverage Technology to Improve Performance: The Senso...Kevin Delin: How Can We Leverage Technology to Improve Performance: The Senso...
Kevin Delin: How Can We Leverage Technology to Improve Performance: The Senso...
 
Brian Lepore: The Evolving Threats: GAO's Report on DOD's Infrastructure Adap...
Brian Lepore: The Evolving Threats: GAO's Report on DOD's Infrastructure Adap...Brian Lepore: The Evolving Threats: GAO's Report on DOD's Infrastructure Adap...
Brian Lepore: The Evolving Threats: GAO's Report on DOD's Infrastructure Adap...
 
Brian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government PerspectiveBrian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government Perspective
 
David Kaufman: FEMA's Preparedness: A Leading, Agile, Focused Agency
David Kaufman: FEMA's Preparedness: A Leading, Agile, Focused AgencyDavid Kaufman: FEMA's Preparedness: A Leading, Agile, Focused Agency
David Kaufman: FEMA's Preparedness: A Leading, Agile, Focused Agency
 
Homeland Security: Understanding Funding and Spending
Homeland Security:  Understanding Funding and SpendingHomeland Security:  Understanding Funding and Spending
Homeland Security: Understanding Funding and Spending
 
Homeland Security Funding 2013
Homeland Security Funding 2013Homeland Security Funding 2013
Homeland Security Funding 2013
 
The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
The Cyber Threat Landscape
 
Intelligence Community Science & Technology: Opportunities for Small Business...
Intelligence Community Science & Technology: Opportunities for Small Business...Intelligence Community Science & Technology: Opportunities for Small Business...
Intelligence Community Science & Technology: Opportunities for Small Business...
 
U.S. Customs & Border Protection (CBP) Automated Commercial Environment (ACE)...
U.S. Customs & Border Protection (CBP) Automated Commercial Environment (ACE)...U.S. Customs & Border Protection (CBP) Automated Commercial Environment (ACE)...
U.S. Customs & Border Protection (CBP) Automated Commercial Environment (ACE)...
 
U.S. Customs & Border Protection (CBP) Funding Outlook
U.S. Customs & Border Protection (CBP) Funding OutlookU.S. Customs & Border Protection (CBP) Funding Outlook
U.S. Customs & Border Protection (CBP) Funding Outlook
 

Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigate and Minimize the Damage: Improving Cybersecurity and Resilience Through Acquisition

  • 1. IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION Implementation of the Final Report of the Department of Defense and General Services Administration Emile Monette, GSA Office of Mission Assurance 23 Oct 2014
  • 2. Acquisition Reform is Part of the Answer  When the government purchases products or services with inadequate in-built “cybersecurity,” the risks created persist throughout the lifespan of the item purchased. The lasting effect of inadequate cybersecurity in acquired items is part of what makes acquisition reform so important to achieving cybersecurity and resiliency.  Currently, government and contractors use varied and nonstandard practices, which make it difficult to consistently manage and measure acquisition cyber risks across different organizations.  Executive Order 13636 and Presidential Policy Directive 21, issued concurrently in February, 2013, require the agencies to take an integrated approach to cybersecurity through a variety of channels, including Federal acquisition. 1
  • 3. Executive Order 13636  On February 12, 2013, the President issued an Executive Order for “Improving Critical Infrastructure Cybersecurity,” directing Federal agencies to provide stronger protections for cyber-based systems that are critical to national and economic security.  Section 8(e) of the EO required GSA and DoD, in consultation with DHS and the FAR Council: Within 120 days of the date of this order, the Secretary of Defense and the Administrator of General Services, in consultation with the Secretary and the Federal Acquisition Regulatory Council, shall make recommendations to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs, on the feasibility, security benefits, and relative merits of incorporating security standards into acquisition planning and contract administration. The report shall address what steps can be taken to harmonize and make consistent existing procurement requirements related to cybersecurity.” 2
  • 4. Joint Working Group  The “Joint Working Group on Improving Cybersecurity and Resilience through Acquisition,” was formed to prepare the Section 8(e) Report  Core group comprised of topic-knowledgeable individuals representing broad expertise in information security and acquisition disciplines selected from:  DoD: USD-AT&L (DPAP, SE, C3CB), DoD-CIO, DISA, DIA  GSA: OMA, FAS (ITS/SSD), OCIO, OGP (ME, MV), OGC, OCSIT, PBS  DHS: NPPD (CS&C), USM (OCPO, OSA)  Commerce: NIST  EOP: OMB (OSTP, OFPP), NSC  120-day collaborative effort with high level of stakeholder input – Over 60 individual engagements  Industry Associations, Critical Infrastructure Partnership Advisory Council Sector Coordinating Councils, individual large and small companies, media interviews – Federal Register Notice – 28 comments received (closed June 2013) 3
  • 5. Section 8(e) Report  The Final Report, "Improving Cybersecurity and Resilience through Acquisition," was publicly released January 23, 2014: (http://gsa.gov/portal/content/176547)  Recommends six acquisition reforms: I. Institute Baseline Cybersecurity Requirements as a Condition of Contract Award for Appropriate Acquisitions II. Address Cybersecurity in Relevant Training III. Develop Common Cybersecurity Definitions for Federal Acquisitions IV. Institute a Federal Acquisition Cyber Risk Management Strategy V. Include a Requirement to Purchase from Original Equipment Manufacturers, Their Authorized Resellers, or Other “Trusted” Sources, Whenever Available, in Appropriate Acquisitions VI. Increase Government Accountability for Cyber Risk Management Ultimate goal of the recommendations is to strengthen the federal government’s cybersecurity by improving management of the people, processes, and technology affected by the Federal Acquisition System 4
  • 6. Next Steps  Working Group leads: 1. Institute Baseline Cybersecurity Requirements as a Condition of Contract Award for Appropriate Acquisitions - Don Davidson, OSD/CIO donald.r.davidson4.civ@mail.mil 2. Address Cybersecurity in Relevant Training - Andre Wilkins, DHS/HSAI andre.wilkins@hq.dhs.gov 3. Develop Common Cybersecurity Definitions for Federal Acquisitions - Jon Boyens, NIST jon.boyens@nist.gov 4. Institute a Federal Acquisition Cyber Risk Management Strategy - Don Johnson, OUSD/AT&L donald.b.johnson1.civ@mail.mil 5. Include a Requirement to Purchase from Original Equipment Manufacturers, Their Authorized Resellers, or Other “Trusted” Sources, Whenever Available, in Appropriate Acquisitions - Emile Monette, GSA/OMA emile.monette@gsa.gov 6. Increase Government Accountability for Cyber Risk Management - Joe Jarzombek, DHS/NPPD/CS&C Joe.Jarzombek@hq.dhs.gov  Working Group will continue stakeholder-centric process  Federal Register Requests for Comment  Conferences, symposia, meetings, media  Iterative implementation, linked to existing rules / practices  Focus on mission/function prioritization and criticality to assess risk 5