SlideShare a Scribd company logo
1 of 23
Download to read offline
Government Investor Services
2015
DEFINING
CYBERSECURITY
THE NEXT EVOLUTION OF FEDERAL DEMAND
2005 2007 2009 2013 2015
Hackers target the point-of-sale system of Walmart and
access sensitive information, revealing that the nation’s
largest retailer had a number of significant security
vulnerabilities including storing at least four years’ worth
of unencrypted credit card information.
2005
A June 2007 network intrusion at the Pentagon
resulted in the theft of sensitive Department of
Defense data, including information regarding the
processes and procedures of the DoD that were
deemed valuable to adversaries.
2007
Several U.S. Government websites – including those
of the White House, State Department and The
Pentagon – experience a “distributed denial of service”
attack that takes the sites down for several days.
2009
Farmers Insurance, MasterCard,
and several high-level government
sites are hacked and several thousand
usernames and logins, as well as other
confidential information was released.
2012
An attack on the point-of-sale system used
by Target, the nation’s second largest
retailer, results in 40 million credit and
debit card numbers being compromised.
2013
The U.S. Office of Personnel Management is hacked, with a
total of 21.5 million social security numbers and 5.6 million
fingerprint records compromised. Government-sponsored
Chinese hackers have been identified as the likely source.
Hackers gain access to BlueCross’ system for over six months,
exposing 11 million members’ names, dates of birth, Social
Security numbers, bank account information and other sensitive
information.
Anthem, one of the nation’s largest health insurers, announces
that the detailed personal information of as many as 80 million
current and former customers was compromised.
2015
A group of Chinese hackers orchestrate a sophisticated targeted
attack on corporate infrastructure of Google and at least 20 other large
companies. Access to the email accounts of several Chinese human rights
activists were compromised.
2010
2011
THERISINGTIDEOFCYBERSECURITY
Graphic source: Google searches for cybersecurity over time
Hackers gain access to T.J. Maxx and Marshalls’ 45
million credit/debit card and check information. The
company later paid a $9.75 million settlement in a class
action lawsuit over the breach.
2006
“The most significant breach of U.S. military computers ever” occurred
when a flash drive infected by a foreign intelligence agency uploaded
malicious code to a central military network. The incident led to the creation
of the U.S. Cyber Command in 2009.
Hackers target an oil pipeline in Turkey and inject malicious software that
allows them to tamper with the system – causing an explosion that sent
flames 150 feet into the air.
2008
An “external intrusion” sends the Sony PlayStation Network offline, and
compromises personally identifying information (including credit card details)
of its 77 million accounts, in what is one of the largest data breaches ever.
Bank of America website hacked by a lone Turkish hacker – estimated
85,000 credit card numbers and accounts stolen.
2011 Sony Pictures Entertainment experienced one of the most
devastating corporate attacks in history. Leaked files included
personal details of around 6,000 Sony employees, upcoming
Sony feature films and the salary details of top executives.
The Bitcoin exchange Mt.Gox filed for bankruptcy after $460
million was apparently stolen by hackers due to “weaknesses
in [their] system”.
2014
JLL’s Government Investor Services (GIS) team closely tracks issues
that impact federally-leased real estate. With over $32 billion spent
in the past decade and trillions more planned for decades to come,
cybersecurity will renew federal leasing velocity in ways not seen since
the stimulus package of 2009.
In an effort to educate our clients and provide the substantive analysis
the owner/investor community has come to expect from our practice
group, GIS has prepared a comprehensive report on cybersecurity. This
is a topic that brings up many questions and as thought leaders in this
space, we provide answers and informed guidance.
In this original book, GIS outlines the threat, details the legislative
history, identifies the agencies leading the Government’s
cybersecurity efforts, provides agency-by-agency budget
breakdowns, and, most importantly, examines the potential impact
this transformative movement is going to have on your federally-
leased asset or potential acquisition.
he global cybersecurity market
is currently worth more than
$107 billion and is expected
to grow to over $170 billion by
2020–an annual growth rate
of almost 10%. The effects of
this rate of growth on the U.S. economy should be
meaningful and, potentially, transformative. As the
largest practice group of its kind in the country,
HOW DID WE
GET HERE?
MORE THAN A NEWS STORY
T
INTRODUCTION....................................................................................1
THE INFRASTRUCTURE LANDSCAPE............................................ 2
CYBER THREATS BY INDUSTRY...................................................... 4
PROPOSED LEGISLATIVE IMPACT ON REAL ESTATE................... 6
GOVERNMENT CYBER OVERVIEW..................................................8
CYBER SPENDING BY AGENCY.......................................................16
FORECAST..........................................................................................28
INDUSTRY PERSPECTIVES ON CYBER IMPACT.........................30
CYBER GLOSSARY............................................................................32
TABLEOFCONTENTS
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
he federal real estate market has experienced
a significant decrease in demand in the first
half of this decade. Executive mandates
requiring reduction in space consumption;
Congressional consensus regarding per person
space utilization compression and/or increase
in teleworking among federal employees, have all coalesced into
an unprecedentedly flat demand horizon. While the government
focuses on austerity and reduction in federal space consumption,
there is, however, an area of growth emerging with not only public
economic impact, but impact on the macro economy and the
private sector. Cybersecurity, cyberwarfare and the ripple effects of
cyber focused growth spending will be felt all over the Washington
region and around the country. This report explores and explains
cybersecurity as a policy movement and the potential impact its
implementation could have on the federally-leased commercial real
estate market.
The complicated infrastructure of networks that deliver and protect
information in the cyber age intertwine the destinies of all industries
and institutions. An attack on one network is an attack on all.
Recognizing this fragile interdependency, the federal government
has begun to allocate spending and resources across the entire
federal spectrum.
In an effort to coordinate an organized response, the government
has assigned various agencies responsibilities based on how closely
their mission matches the threat posed by the type of attack.
Moreover, several pieces of legislation have been introduced to
Congress that seek to promote the coordination of existing agencies
to lead the response and create new ones to aid in this charge. Most
importantly, however, the bills seek to confirm financial commitment
to the nation’s cybersecurity efforts by appropriating funding to
augment the current response apparatus and recruit experts to
ensure that the U.S. remains at the forefront of cybersecurity, both
offensively and defensively.
DEFININGCYBER
The impact on your commercial
real estate portfolio
T
This book examines the ways in which
cyberthreats are handled by our three most
important sectors: military, intelligence and
civilian. Each domain handles the threats and
response coordination uniquely because in each
one the goals are decidedly different.
As always, federal priorities come into sharp
focus when analyzing the amount of spending
available to various response units. This report
breaks down this spending on an agency by
agency basis and provides not only a rationale
for it but predicts the way in which this spending
will affect specific agencies’ real estate
portfolios.
Lastly, in the forecast section, GIS interpolates
the statistics and information included hereto
and offers specific predictions on cyber’s impact
on federally-leased real estate both locally and
nationally. The predictions also include insight
in areas of real estate not limited to federally-
leased assets as JLL colleagues across all
disciplines weigh in on cyber’s impact across all
product types.
GIS hopes that the information in this report
provides our investor clients valuable insight
into the future of their federally-leased assets or
potential acquisitions.
1
COMMUNICATIONS
odern life consists of a continuous series of
invisible negotiations with vast networks of
electronic infrastructure that control the way we
recognize, process and disseminate information.
In other words, all of the things that we rely on
every day rely on the things that we cannot see.
While the past decade has represented exponential technological
advancements in the way in which we communicate and the speed
at which that communication occurs, it has also introduced new and
dangerous vulnerabilities. The “War on Terror” presented the country
with a living and breathing enemy and, thus, a blueprint for homeland
defense; conversely, the threat of cybersecurity arrives in the form of
an invisible enemy.
This new type of threat requires a new and creative response. As it
has done so many times in the past when prevailed upon to respond
to ever evolving threats and enemies, the U.S. Government has
responded with vigor, ingenuity, and, most importantly, money. This
response is still in its gestation period but the net result is typically
federal: new agencies, increased funding, increased collaboration,
increased scrutiny and a search for innovation.
For owners and investors of federally-leased
assets, it is imperative to understand the
relationship your tenant has to the Government’s
response to cybersecurity.
For the private sector, understanding your
tenants’ cyber-related role will give you a
competitive edge in the market as their space
needs over the coming decades can be affected
by what kind of attack they are guarding against.
Each major industry will care about different
types of cyber threats and the various agencies
that are involved in protecting them.
THE INFRASTRUCTURE LANDSCAPE
WHAT WE RELY ON EVERY DAY RELIES ON THE THINGS WE CANNOT SEE
M
2 3
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
o two cyber attacks are the same and this is a fact
recognized by the Federal Government.
The type of information at risk due to a data
breach attack on a bank or financial institution
is very different than one on a nuclear power
plant. As outlined in the accompanying graph, the Government has
organized the threat response on an industry-by-industry basis.
Various agencies are assigned responsibilities based on how closely
their mission matches the threat posed by the type of attack.
For owners and investors of federally-leased assets, the implications
are broad. Anecdotal inferences about whether a tenant is potentially
involved in the cybersecurity initiative may prove insufficient as
many agencies have been tasked with cyber responsibilities. For
example, the Small Business Administration (SBA) and Federal
Trade Commission (FTC) are both critical to the protection of various
financial industry sectors, a fact perhaps not immediately intuitive.
Nevertheless, many agencies will grow in
correspondence to the size of the threat they
protect and occupancy behavior should be
tracked by owners and investors accordingly.
Moreover, although naturally headquartered in
Washington, DC, the cybersecurity response
is a national threat and most of the agencies
identified throughout this report have offices
across the entire country. Owners should expect
that cyber growth will be nationwide though
with a disproportionate amount occurring in the
Washington metro.
CYBER THREATS
BY INDUSTRY
N
NEWS
CYBER THREATS FACED:
PHISHING, ZERO-DAY
ATTACKS AND DATA BREACHES
Assigned agency support:
Federal Communications Commission (FCC)
Federal Trade Commission (FTC)
RETAIL
CYBER THREATS FACED:
OPEN WIFI, POINT-OF-SALE
COMPROMISE AND DATA BREACH
Assigned agency support:
Federal Bureau of Investigation (FBI)
US Secret Service (USSS)
Consumer Products Safety Commission (CPSC)
BANKS
CYBER THREATS FACED:
DENIAL-OF-SERVICE, FRAUD, BOTNETS
AND WEB AUTHENTICATION ATTACKS
Assigned agency support:
US Secret Service (USSS)
Department of Treasury
Office of the Comptroller of the Currency (OCC)
Securities and Exchange Commission (SEC)
Consumer Financial Protection Bureau (CFPB)
HOSPITALITY
CYBER THREATS FACED:
POINT-OF-SALE COMPROMISE
(CREDIT CARDS), OPEN WIFI AND
ADMIN ACCOUNTS
Assigned agency support:
US Secret Service (USSS)
WEBSITES
CYBER THREATS FACED:
MALICIOUS CODE INJECTION AND EXCLUSION
FROM CORE SECURITY
Assigned agency support:
National Programs and Protectorate Directorate (NPPD)
Department of Homeland Security (DHS)
Federal Communications Commission (FCC)
DEFENSE/
INDUSTRIAL SECTOR
CYBER THREATS FACED:
ZERO-DAY HACKS, REMOTE ACCESS AND
PHISHING
Assigned agency support:
Department of Defense (DoD)
National Protection and Programs Directorate (NPPD)
CREDIT CARD PROCESSING
CYBER THREATS FACED:
PHISHING AND EGRESS TRAFFIC
AND DATA BREACH
Assigned agency support:
Internal Revenue Service (IRS)
Consumer Product Safety Commission (CSPC)
Department of Treasury
Federal Bureau of Investigation (FBI)
US Secret Service (USSS)
SMALL  MEDIUM
BUSINESSES
CYBER THREATS FACED:
CREDIT CARDS, PHISHING,
POINT-OF-SALE COMPROMISE
Assigned agency support:
Federal Bureau of Investigation (FBI)
Small Business Administration (SBA)
Department of Treasury
CYBER: IMMUNE FROM REDUCTION?
Although agencies have been directed
to freeze, and subsequently reduce, the
footprint of their leased portfolio, new
responsibilities related to cybersecurity
may make it difficult to do so. As agencies
seek to implement new policies and
regulations in accordance with cyber
initiatives, new hires may make space
reduction no longer feasible as the
Government fits more personnel into the
same amount of leased space. Although
many of these hires may not cause net
new expansion, investors may see less
reduction than anticipated as agencies
implement cyber mandates.
4 5
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
COMPREHENSIVE NATIONAL
CYBERSECURITY INITIATIVE
Declassified in 2010, the Comprehensive National
Cybersecurity Initiative (CNCI) was launched in January
of 2008 to protect government computer systems and
begin to address the protection of private sector cyber
systems. CNCI covers a range of programs—from
research and development and promoting cyber
education to the first complex federal effort to develop
deterrence strategies in cyberspace. Some of CNCI
remains classified, such as detailed descriptions of the
government’s cyber offense capabilities. Additionally,
the declassification of CNCI was the first federal public
disclosure of the role of the National Security Agency in
one monitoring program—three years before the Edward
Snowden leaks. CNCI laid the foundation for most cyber
related federal expansion in 2009 and beyond.
2008
EXECUTIVE ORDER: IMPROVING
CRITICAL INFRASTRUCTURE
CYBERSECURITY
This 2013 Executive Order solidified the Department
of Homeland Security (DHS) as the primary shepherd
of civilian-focused cybersecurity operations for the
federal government. While the Department of Defense
had undergone over a decade of aggressive cyber
expansion, organizing and expanding the civilian side of
federal cyber was still in its infancy—and it now had a face:
DHS. The Improving Critical Infrastructure Cybersecurity
Executive Order aimed to promote and incentivize the
adoption of cybersecurity practices across all Executive
Branch agencies. The Executive Order directed agency
heads to work with DHS to share information regarding
cyberthreats and security. Simultaneous to releasing
the above Executive Order, the Obama Administration
released a 2013 Presidential Policy Directive (PPD) titled
“Critical Infrastructure Security and Resilience” designed to
strengthen the physical and cyber resilience of the nation’s
critical infrastructure.
2013
NATIONAL CYBERSECURITY
PROTECTION ACT
The most significant harbinger of bipartisan support for
federal cyber expansion, this 2014 Act was passed in the
Democratic controlled Senate and then, within the same
week, was passed unanimously in a Republican controlled
House. The Act was heralded as the most significant
cyber bill to pass Congress in over a decade. The main
aim of the Act was to codify the existing cybersecurity
and communications operations center at DHS, known
as the National Cybersecurity and Communications
Integration Center (NCCIC). NCCIC provides a platform
for the government and private sector to share information
about cybersecurity threats, incident response and
technical assistance. The Act requires NCCIC to include
representatives of federal agencies, state and local
governments and private sector owners and operators
of critical information systems. The Act also delegates
implementation authority for defense-related and
intelligence-related information security to the Secretary
of Defense and the Director of National Intelligence,
respectively.2014
DHS CYBERSECURITY WORKFORCE
RECRUITMENT AND RETENTION ACT
The DHS Cybersecurity Workforce Recruitment and
Retention Act focuses on strengthening the federal
government’s cybersecurity workforce. The bill aims at
improving hiring procedures and compensation ranges
for cybersecurity positions at DHS. Under the provisions
of the bill, DHS is required to pay cybersecurity workers
salaries similar to those of the cybersecurity positions
in the Defense Department. The bill also requires DHS
to file annual reports on its recruitment and retention
of cybersecurity workers. The bill (and its sister bill, the
Cybersecurity Workforce Assessment Act) have been
passed by both the House and the Senate and await
the President’s signature. The latter bill would require DHS
to conduct an assessment of its cybersecurity workforce
every three years, in addition to developing a strategy for
enhancing the recruitment and training of cybersecurity
employees. Both bills would boost DHS’ ability to
competitively hire cybersecurity professionals, a possible
boon for DHS’ future leased space needs.
2014
apitol Hill has been aware of the importance
of protecting America’s military and domestic
technology infrastructure for some time but the
focus has sharpened and gained momentum
since the beginning of this decade. This legislative
history of cybersecurity is described on the next
page, but the most compelling aspect of the set of policy initiatives
is the level of funding commitment represented. In an era when
both Republicans and Democrats are seeking to minimize federal
spending at home and abroad. The resources allocated, on a
bipartisan basis, to fighting cyber threats provide evidence of real
and enduring financial commitment.
PROPOSED
LEGISLATIVE
IMPACT ON
REAL ESTATE
C
2009 2010 20 11 2012 2013 20142008
AGENCYCREATEDAGENCYCREATED
RECRUITMENTPRIORITIZEDDHSPUTINCHARGE
6 7
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
GOVERNMENTCYBER
Overview
PROTECT
THE MILITARY
In 2013, the Office of the
Director of National Intelligence
(ODNI) named “cyberthreats” as
number one on the International
Strategic Threat List. This
is the first time in 10 years
something else was listed as
more threatening to the security
of the United States than
terrorism. Cybersecurity remains
the top priority as over half
of the Federal Government’s
cyber spending is devoted to
military-related cyber priorities.
Whether focused on detecting
threats within internal networks
or disrupting the U.S.’s
enemies’ ability to use their
own network and infrastructure,
the Department of Defense
has invested heavily in its
cyberspace operations.
MILITARY
COLLECTION
 DISSEMENATION
Tasked as the primary
coordinator of the cyber
activities between the
intelligence, law enforcement
and military agencies, the
intelligence community’s
cyber program is continuously
evolving. To keep up with
the latest iteration of the
threats facing the nation,
the intelligence community
has shifted from a focus on
internal cybersecurity and
control of its own network
infrastructure, toward a focus
on cyber-offensive capabilities.
This comes at a time when
the government’s priorities
are shifting away from wars in
Iraq and Afghanistan towards
data collection and defensive
espionage. Thus, digital spying
is extremely important.
INTELLIGENCE
PROTECT
THE CIVILIANS
Until 2009, the federal
government did not have
a domestic interagency,
coordinated cyber plan.
Therefore, each individual
agency was forced to formulate
its own cyber budget, priorities
and best practices. DHS and
the FBI have been delegated by
the Administration as primary
coordinators for non-military – i.e.
“civilian” federal government
cyber initiatives. Both agencies
are seeking to streamline the
way the federal government
protects itself from cyber
threats --with varying degrees
of success. The civilian third of
the federal government’s cyber
strategy is, comparatively, still in
its infancy so goals and priorities
are constantly evolving making
the status more difficult to track.
CIVILIAN
IN THE WORLD OF GOVERNMENT, CYBER FALLS INTO THREE CATEGORIES: MILITARY,
INTELLIGENCE AND CIVILIAN. IN THE FOLLOWING SECTION, WE DESCRIBE THE VARIOUS WAYS
THESE SECTORS DEAL WITH CYBERSECURITY AND CYBERTHREATS.
8 9
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
epartment of Defense response to cybersecurity
has its origins in BRAC Legislation. Under DoD’s
latest Base Realignment and Closure Act, DoD
sought to organize and consolidate real property
according to mission. Several military bases were
designated as receiver bases for Information
and Cyber Technology – for example, Maryland’s Fort Meade. To that
end, DoD policy on cybersecurity represents a continuation of the
changes initiated under BRAC. Bases with components responsible
for defending against cyber threats and focused on intelligence
gathering will continue to experience growth, and land and office
vacancy located at or near these bases will have the opportunity to
capture lease demand as federally-owned bases struggle to catch
facility infrastructure up with the growth.
MILITARY: BUILDING
A CYBER ARMY
D
CYBER AND THE MILITARY:
DEPARTMENT OF DEFENSE’S CYBER STRATEGY
DOD CYBER: SECURE AND
SPECIALIZED WORKSPACE
USCYBERCOM stands as one of
the few government operations in
recent years that have significantly
increased their workforce size
and subsequent need for housing
increased personnel. Unlike many
civilian government agencies,
the nature of DoD’s cyber mission
necessitates highly secure and
specialized workspaces that are
not subject to the same teleworking
initiatives and pressures as the rest
of the federal government.
BRAC-RELATED CYBER CONSOLIDATION TO FORT MEADE WILL
RESULT IN NEW OPPORTUNITIES
CHINA
Steals intellectual property
(IP) from global businesses to
benefit Chinese companies and
undercut U.S. competitiveness
RUSSIA
Stealthy in their cyber tradecraft
and their intentions are
sometimes difficult to discern
STATE-SPONSORED
CRIMINAL ACTORS
Patriotic entities often act as
cyber surrogates for states, and
non-state entities can provide
cover for state-based operators
SOPHISTICATED
ADVERSARIES
INDEPENDENT
CRIMINAL ACTORS
Considerable threat in
cyberspace, particularly to
financial institutions, and
ideological groups often use
hackers to further their
political objectives
ISIS/ISIL
Recruit fighters and
disseminate propaganda and
have declared their intent
to acquire disruptive and
destructive cyber capabilities.
NORTH KOREA
Overt level of hostel threat,
though less sophisticated
than North Korea.
LESS-DEVELOPED
ADVERSARIES
ISIS/ISIL
WHO ARE WE FIGHTING?
10 11
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
684
New military jobs
2,915
New civilian jobs
1,764
New contractor positions
62,000
Total cyber related positions
at Fort Meade targeted
n an increasingly connected world,
counterintelligence plays a critical role in
enhancing the cybersecurity posture of the
United States, as counterintelligence is used to
create barriers to entry in an otherwise readily
accessible and vulnerable area. The nature of
the information that the intelligence community collects and
stores means that it is consistently the target of cyber-attacks
from a variety of enemies, both organized or decentralized,
requiring an increasingly cyber-aware intelligence community
workforce and specialized infrastructure.
The 2008 Comprehensive National Cybersecurity Initiative created
the foundation for a government-wide approach to protecting the
nation from cybersecurity threats. As part of it, the National Cyber
Investigative Joint Task Force (NCIJTF) was established under
Presidential Directive as the steward of the country’s national
cybersecurity initiatives.
The NCIJTF joins together 19 intelligence (including the National
Security Agency (NSA) and DHS), law enforcement and military
agencies to coordinate cyber threat investigations. The principle
behind NCIJTF is simple: notification of an intrusion to one agency
will be notification to all.
In addition to NCIJTF, several new intelligence
agency groups have been formed over the
past several months and years to address the
growing need for cybersecurity focus within the
government. These groups include the CIA’s
Directorate of Digital Innovation and the Cyber
Threat Intelligence Integration Center (CTIIC).
Just as the NCIJTF is the guiding force behind
the government’s cyber initiatives, the DNI is the
unifying agency that marries the intelligence
community together - and in turn houses
several Cyber Intelligence Task Forces that focus
the communities’ cyber efforts.
Nearly every intelligence agency already
contains, or will soon develop, a group that
is solely focused on cybersecurity, or in the
intelligence community - cyberespionage.
INTELLIGENCE:
CYBERESPIONAGEIN
THE21STCENTURY
I
THE IMPACTS OF CYBER ON THE
INTELLIGENCE COMMUNITY

CYBER INTELLIGENCE AGENCY MAP
CYBERESPIONAGE:
GROWTH TIED TO BLACK FIBER
The stage is set for major growth
in the sector of cyberespionage -
with both hiring a new generation
of intelligence analysts that
are educated in the field of
cybersecurity and providing net-
new infrastructure and secure
space for this mission which,
until now, has been limited to
Northern Virginia, along the
established secure government
“black fiber” network.
12 13
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
ost of the domestic and civilian cyber capabilities
of the Federal Government focus on defensive
and investigatory cyber tasks. While military
cyber spending is focused under the Department
of Defense, the civilian arm of the U.S. cyber
network is much harder to understand and map
out, as many agencies have taken on various cyber oriented roles
as cyber defenses have evolved over time. Over the past couple
of decades, there have been two agencies that have emerged as
the main stakeholders in the Federal Government’s civilian fight to
defend the homeland from cyberthreats.
It’s easy to understand why the Federal Bureau of Investigation
(FBI) has become a key part of the Government’s defensive cyber
response force. Much like with the notorious gangsters and
organized crime of the early 20th century and the rise of espionage
and sabotage from World War II through the Cold War, the 21st
century has brought on an entirely new set of criminal challenges
with emerging digital technologies. As the nation’s principal law
enforcement agency, the FBI has evolved to combat emerging
cybercrimes from nation-states, terrorist organizations and
transnational and domestic criminal enterprises.
The Department of Homeland Security is
responsible for coordinating the overall federal
effort to protect the security and resilience
of the nation’s critical physical infrastructure
(nuclear reactors, dams, hospitals, railroads,
etc). As part of that responsibility, DHS also
supports critical infrastructure owners and
operators in preparing for and protecting
against cyber incidents. From 2009-2014,
DHS prevented $10 billion in potential losses
through cybercrime investigations and
arrested more than 5,000 individuals for their
participation in cybercrime activities. There
are many DHS components that have active
cyber functions—most notably the U.S. Secret
Service (USSS), National Protection and
Programs Directorate (NPPD).
CIVILIAN:DEFENDINGTHEHOMELAND
M
DHS  FBI: LAW ENFORCEMENT MEETS CYBER
HISTORY
In the FY2015 “CRomibus” federal spending bill, GSA was allocated $35
million for designing and beginning development preparations for a
new federally-owned campus that will “house federal employees and
contractors dedicated to the civilian cybersecurity mission.” This earmark
was the first mention of the civilian cyber campus in federal law. Since then,
the civilian cyber campus has been a topic highly discussed in the media
and is surrounded by intense speculation and confusing misinformation.
MISSION
Much of the confusion regarding the campus stems from defining
“civilian cybersecurity” itself. It is important to note that the campus will
be designed to house civilian agencies and private sector contractors.
While there will undoubtedly be some critical mission overlapping with
the Defense Department, it is very likely the civilian cyber campus will
remain a wholly separate entity from the military’s US Cyber Command
activities in and around Fort Meade, Maryland. The Department of
Homeland Security (DHS) and the Department of Justice (DoJ) have
been tasked with coordinating the creation of the civilian cyber campus.
Specifically, the National Protection and Programs Directorate (NPPD;
for DHS) and the Federal Bureau of Investigation (FBI; for DoJ) will be the
two agencies around which the civilian cyber campus will be designed.
Two other agencies—the Office of Intelligence  Analysis (IA) on behalf
of the Intelligence Community and the US Secret Service (a division
of DHS)—will also be deeply involved with the evolving civilian cyber
mission moving forward.
IMPACT
Additional confusion surrounds exactly which agencies would
be involved in the consolidation—and which leases are at risk for
consolidation? Currently there are a number of agencies that accept
cyberattack reports from the general public and private sector. The
FBI’s Internet Crime Complaint Center is the main general repository
for general public reporting. The Secret Service is often the first
agency to learn of large breaches at banks and companies. Once the
Secret Service receives a complaint, it disseminates its information
through the National Cybersecurity and Communications Integration
Center (DHS), Information Sharing and Analysis Centers (DHS),
Electronic Crime Task Forces (FBI) and additional agencies. Expect
each of these functions to consolidate onto the campus.
The potential impact of the Civilian Cyber Campus on the Washington
DC metro area is significant. As Northern Virginia, Southern Maryland
and the District of Columbia compete to become the home of the
campus, the potential for an increase in leasing velocity on land adjacent
to the campus could be extraordinary. As civilian agencies seek to
partner with the private sector and the campus itself reaches capacity,
expansion and overflow will become inevitable.
CIVILIAN CYBER CAMPUS
LONG TERM SPACE
NEEDS UNKNOWN
Similar to the St. Elizabeth’s
Campus and FBI Headquarters
consolidations, the mere idea
of a future consolidation plan
will affect GSA’s leasing policy
upon lease expiration for
future Civilian Cyber Campus
occupants. Owners and investors
should expect short term, “as-
is” extension (5 years or less)
requests, regardless of the
status of the actual scheduled
date of completion.
On the other hand, all jurisdictions stand to
experience vacancy as agencies consolidating
onto the campus leave current locations. For
example, NPPD, FBI and Secret Service are in
leases spread across Northern Virginia and the
District of Columbia – whether they maintain a
presence off of the campus or not, the chance of
reduction, if not 100% relocation is high.
GETTING THE FACTS STRAIGHT:
• The civilian cyber campus isexactly that: civilian. The DefenseDepartment will have littleinvolvement.
• The campus is envisioned to befederally owned.
• Four agencies are deeply involvedin the civilian cyber campus:
National Protection and ProgramsDirectorate (NPPD)
Federal Bureau of Investigation(FBI)
The Office of Intelligence Analysis (IA)
US Secret Service
• The current expected price tag ofthe campus is $540 million.
14 15
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
he federal government has spent almost $32
billion on cybersecurity-related expenditures in
the past 10 years. More importantly, the cyber
spending boom shows no sign of slowing, as
spending increased 281% from 2006 to 2014 (an
average of 22% annually). This historic growth
in cyber spending runs counter to the greater trend in federal
government spending that has led to a relatively modest increase of
4.2% annually over the same time period.
As the world becomes increasingly digitized, so has
the federal government, but individual agencies are
not spending on cybersecurity in similar ways. Each
agency’s funding over the past 10 years tells a unique
story - from the consistent upswing in spending
of healthcare-focused agencies like HHS or VA,
corresponding with new initiatives that have led these
agencies to increasingly deliver sensitive information
through online digital portals such as Healthcare.
gov, to the recent explosion of cyber expenditures
of a newly digitally focused Social Security
Administration’s mission dictating cyber strategy.
$31.6B FEDERAL AGENCY CYBER-
SECURITY SPENDING SINCE 2006
T
16 17
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
oD’s critical role in the nation’s response to cyber
terrorism makes it the heaviest cyber spender
within the federal government. Accounting for
almost half of the total spending of the last
decade, the DoD cyber budget increased 295%
from 2006 to 2014. Regionally, this spending has
mostly occurred in Northern Virginia, which is not surprising given the
amount of square footage the agency occupies in the region.
008’s Comprehensive
National Cybersecurity
Initiative (CNCI) solidified
DHS’ role in protecting
the homeland from
cyberterrorism, which
corresponds to a sharp increase in DHS
cyber spending. Northern Virginia and the
District of Columbia could see growth related
to DHS spending since the agency already
occupies significant square footage in both
markets. Moreover, as demonstrated by the
accompanying chart, DHS Cyber Security
Specialists command salaries at the highest
end of the federal pay scale and a hiring influx
of high earners in the region could have a
significant impact on the region’s economy.
DEPARTMENT OF DEFENSE DEPARTMENT OF HOMELAND SECURITY
D 2$16.0B
$3.3B
DEPARTMENT OF DEFENSE LEASED
LOCATIONS IN NORTHERN VIRGINIA
SPENT ON CYBERSECURITY SINCE 2006
SPENT ON CYBERSECURITY SINCE 2006
HOMELAND SECURITY AVERAGE SALARY BY POSITION
DHS POSITION SALARY LOW MID HIGH
Cyber Security Specialist $74,000 $110,000 $175,000
Medical Doctor $129,988 $152,792 $168,709
Nuclear Engineer $69,236 $82,918 $97,125
Intelligence Officer $70,064 $82,782 $96,285
US Air Marshall $44,000 $82,782 $96,285
Policy Analyst $87,000 $90,000 $93,000
Program Analyst $64,109 $76,515 $91,053
Mechanical Engineer $67,943 $77,057 $86,894
Coast Guard Officer $53,408 $68,000 $86,400
Security Specialist $51,841 $65,496 $82,295
IT Specialist $54,025 $65,727 $77,805
Chemist $49,797 $59,654 $72,326
Coast Guard Enlisted $37,604 $51,972 $66,340
Immigration Officer $34,000 $44,000 $54,800
Customs Specialist $31,000 $41,000 $50,000
Border Patrol Agent $39,000 $41,000 $46,000
Security Screener $34,049 $38,854 $44,304
Salary Source Data: indeed.com
18 19
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
HS’s cybersecurity spending has grown at
a steady pace over the past decade as the
healthcare market continues to mature.
However, the growth of the agency’s real estate
portfolio has remained flat. In its FY 2016 budget
request, HHS proposes a budget of $73 million
for its Cybersecurity Program, which represents a 44% increase
over FY 2015 levels. This increase could be a catalyst for renewed
HHS demand.
Growth related to this spending should occur in Suburban
Maryland –home for most of HHS’ leasehold interests, and
Woodlawn, MD – home of the Centers for Medicaid and Medicare
Services (CMS), and nationally as states engage in federal
healthcare mandates.
DEPARTMENT OF
HEALTH  HUMAN SERVICES
H $2.4B
HHS CYBERSECURITY PROGRAM DIRECT SPENDING
oE will be responsible for securing some of the most
critical energy infrastructure across the country and
funding levels reflect that mandate. Whether or not
the safeguarding of these vulnerable assets causes
net new demand or growth is unclear. However,
unlike some of the agencies with limited geographic
concentrations (such as HHS, Commerce, and State) growth related to
DoE should be national given the agency’s portfolio. Secondary and tertiary
markets, especially, may benefit disproportionately.
DEPARTMENT OF ENERGY
D $1.8B
AS OF 2013 THE US HAD THE FOLLOWING POWER PLANTS:
SPENT ON CYBERSECURITY SINCE 2006
SPENT ON CYBERSECURITY SINCE 2006
20 21
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
1,101
Petroleum
518
Coal
1,476
Hydroelectric
63
Nuclear
1,725
Natural Gas
2,299
Other
Renewable
44
Other Gases
78
Other Energy
Sources
hile 2014’s cyber budget increase may be an outlier,
VA’s spending on cybersecurity still increased over
362% between 2006 and 2013. This consistent
spending growth mirrors HHS’s spending habits as
both agencies respond to growth in the healthcare
industry. Similar to DoE, VA’s growth may occur
nationally as regional VA Clinics and Veterans’ Benefit Offices increase
hires to protect electronic medical records, files and Veterans’
personal information.
DEPARTMENT OF VETERANS AFFAIRS
W $1.1B
NEW AND UNDER CONSTRUCTION
VA LEASED FACILITIES
APPROX LEASE SIZE SQUARE FOOTAGE
0 to 20,000
20,000 to 50,000
50,000 to 100,000
100,000 to 295,001
oS is one of the few agencies that has spent less
on cybersecurity in recent years. Nevertheless, DoS
continues to be one of the top 10 biggest federal
cyber spenders--even without taking into account
2008, a year in which DoS’ cyber spending levels
were beat only by DHS and DOD. Most of DoS’ growth
will occur in the District of Columbia, Northern Virginia and abroad.
DEPARTMENT OF STATE
D $1.1B
WASHINGTON, DC AREA DOS LEASED LOCATIONS
SPENT ON CYBERSECURITY SINCE 2006 SPENT ON CYBERSECURITY SINCE 2006
22 23
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
ommerce will be working to
coordinate federal response to
cyber-threats related to retail
and banking industries. Growth
related to Commerce would
be concentrated in the District
of Columbia and Suburban Maryland, home of the
National Institute of Standards and Technology
(NIST). NIST was called upon in via Executive
Order, to produce “The Cybersecurity Framework”.
Created through public-private collaboration, the
framework provides a voluntary and non-regulatory
set of standards, guidelines and practices to help
businesses address and manage cyber risk in a
cost-effective way. Creation and maintenance of
this network will be headquartered out of NIST’s
Gaithersburg office and growth related to it is
predicted to occur in that submarket.
ainly driven by FBI spending, the Justice
Department has spent almost a billion dollars
on cybersecurity in the past decade. Expect
this number to increase dramatically in the
coming years, as FBI ramps up its leadership
through the National Cyber Investigative Joint
Task Force (NCIJTF). Much of the cyber related growth will occur
outside of the already planned FBI Headquarters Consolidation.
FBI related cyber-growth should take place primarily in Northern
Virginia and nationally as FBI Field offices operationalize cyber
protection mandates.
DEPARTMENT OF JUSTICE
M $0.8B
FBI HEADQUARTERS CONSOLIDATION
PROPOSED SITES
FBI Plans to consolidate its headquarters into an
approximately 1.2 million-square-foot headquarters
in the Washington, DC region by 2021.
$0.6B
NIST ACTIVITIES TO MANAGE CYBERSECURITY RISK
FUNCTION UNIQUE
IDENTIFIER
FUNCTION
CATEGORY
(CATEGORY UNIQUE IDENTIFIER)
ID Identify
Asset Management (AM)
Business Environment (BE)
Goverance (GV)
Risk Assessment (RA)
Risk Management (RM)
PR Protect
Access Control (AC)
Asset Management (AT)
Data Security (DS)
Information Protection Process and
Procedures (IP)
Protective Technology (PT)
DE Detect
Anomalies and Events (AE)
Security Continuous Monitoring (CM)
Detection Processes (DP)
RS Respond
Communications (CO)
Analysis (AN)
Mitigation (MI)
Improvements (IM)
RC Recover
Recovering Planning (RP)
Improvements (IM)
Communications (CO)
DEPARTMENT
OF COMMERCE
C
SPENT ON CYBERSECURITY SINCE 2006
SPENT ON CYBERSECURITY SINCE 2006
24 25
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
oT will be responsible for protecting critical
national infrastructure from cyberattack as well
as mobilizing the response for protection of
air travel communication, including protecting
the communication and traffic routing of the
aviation industry through the Federal Aviation
Administration (FAA). As stewards of some of the nation’s most
critical infrastructure, DoT’s responsibilities and growth will
occur both nationally and locally, within the DC Metro area as
offices grow to respond to the challenge of defending the nation’s
transportation channels.
$0.5B
D
DEPARTMENT OF TRANSPORTATION
hile SSA, barely cracks the top ten list of agency
cyber spenders, recent changes to the agency’s
digital mission has triggered a relative explosion in
cyber related spending. The agency’s cyber spending
increased a whopping 4,136% from 2006 to 2014.
Growth related to SSA should be focused outside of
Baltimore in the Woodlawn submarket (where SSA is headquartered) as
well as nationally in local SSA offices.
SOCIAL SECURITY ADMINISTRATION
W $0.5B
SPENT ON CYBERSECURITY SINCE 2006 SPENT ON CYBERSECURITY SINCE 2006
26 27
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
s this report goes to print, the frequency of
cyberattacks only continues to increase. Within the
past few months several major cyber events have
made headlines across the country. Most notably,
a hack into the Office of Personnel Management
(OPM) exposed sensitive personal information of
more than 22 million people. This number represents about 7 percent
of the country’s population, which was around 320 million in 2014. The
information breach included the highly sensitive Standard Form 86
documents, which contain information on family members and close
friends. It is estimated that the federal government will have to spend
up to $350 million in identity protection services to protect the sensitive
information that was lost in the attack.
Department of Homeland Security Secretary Jeh Johnson deemed
the OPM breach a “wake-up call” and called for increased funding for
cybersecurity spending. He was quickly followed by multiple members of
Congress from both parties, who said they plan to investigate the OPM
breach and the Government’s cybersecurity readiness on the whole. The
Obama administration weighed in on the breach, as well, identifying the
attack as work of the Chinese Government.
With new attacks or attempted attacks surface everyday, cybersecurity
is no ephemeral trend contingent on the fickle fluctuations of media
focus or partisan politics. The cybersecurity movement is poised to be
a transformational moment in our regional and national economies.
As the Government continues to grow and refine the infrastructure of
the federal response, demand for office space will grow, new people
will move into the area and money will be spent across the Washington
Metropolitan Area and around the country. As the specifics play out, the
macro dynamics are already becoming evident. Based on the information
available now, GIS is making the following predictions regarding the
specific ways in which we believe cybersecurity will affect the federally-
leased commercial real estate market.
THERE WILL BE AN INCREASE IN GENERAL DEMAND
Metro area will see an increase in cyber related office space demand
as the number of cyber professionals in the area continues to grow.
Cybersecurity professionals tend to make over 19.8% more than a
standard IT professional, meaning the continued hiring of DC Metro
cyber professionals will have many other positive effects on the local
economy and CRE markets.
THE GOVERNMENT’S INITIAL STRATEGY RELATED
TO LEASING OFFICE SPACE RELATED TO
CYBERSECURITY WILL BE COBBLED TOGETHER
Growth will be piecemeal and occur at locations
already occupied by a cyber related agency
including branches of DHS, NPPD or FBI. The
need to respond quickly will override the desire to
consolidate and the arrival of the cybersecurity
leasing portfolio will resemble the creation of DHS
in the sense that it will be mostly reactive and occur
in fits and starts.
A BELLWETHER MOMENT OF CRITICAL
INFRASTRUCTURE FAILURE WILL GALVANIZE THE
GOVERNMENT INTO COMPREHENSIVE ACTION
REGARDING CYBERSECURITY
True growth in the federal cyber sector may arrive
as the result of a major threat to the nation’s critical
infrastructure. Heretofore, the average American
citizen has perhaps been inconvenienced by a
cyber hack but not threatened in a visceral way. An
attack on the country’s critical infrastructure—a
dam, a power plant—would make the threat real
to the average citizen. Congress would see public
opinion reflect support for an increase in funding
the fight against cyber attacks.
THE WORKFORCE RECRUITMENT AND RETENTION
ACT OF 2014 WILL BE A TRANSFORMATIONAL
PIECE OF LEGISLATION FOR THE WASHINGTON
REGIONAL ECONOMY
Similar to the migration of talent into the region
during the Stimulus Boom of 2008 through 2010,
if the Government prioritizes attracting top tech
talent through offering compensation packages
comparable to the private sector and, specifically
Silicon Valley, every sector of the DC metro
economy could be affected—from multi-housing to
retail to, most notably, commercial office.
FORECAST
A
DEFENSE RELATED GROWTH
The area around Ft Meade has already benefited dramatically from defense related
cyberspending. The Department of Defense, which has at least a decade’s head start on
civilian government cyber buildup, has more than doubled the population of Fort Meade
since 2005. Fort Meade, which was originally headquartered the National Security Agency
(NSA), became the home of the US Cyber Command in 2010. In 2005, the base housed
over 33,000 employees. Today, the base houses over 60,000—doubling the size of the
Pentagon. As a result, the population of Anne Arundel County grew by at least 25% over
the last two decades.
Most of the physical growth at Ft, Meade, expansion, has occurred off the base in buildings
adjacent to the base leased to DoD and NSA.
INTELLIGENCE RELATED GROWTH
Along Route 28, the Government has been building up intelligence related agencies for the
past decade. With the major relocation of the Office of the Director of National Intelligence
(ODNI) and easy access to historic intelligence assets in the area (NRO, CIA, etc;), Route 28 is
an ideal receiver for back office intelligence related cyber space growth.
Moreover, proximity to some of the most important tech firms in the world (Amazon, Google)
makes collocation very attractive to federal agency’s seeking expertise from companies
conversant in cyber-related matters. Continued interface with Silicon Valley will also increase
Route 28’s popularity among federal Cyber tenants given the submarket’s proximity to Dulles
International Airport. Federal and Private sector employees alike can conveniently commute
back and forth between the two Cyber epicenters as needed.
CIVILIAN CYBER GROWTH
Located adjacent to both Marine Base Quantico and National Geospatial-Intelligence Agency (NGA),
northern Stafford County will see a disproportionate amount of cyber related growth from civilian
agencies driven primarily by FBI, in particular. The spending has already spurned dark fiber installation in
the area, as well as fresh contractor relocations in surrounding office parks. While many of the planned
2,000+ new FBI cyber related agent and analyst hires will be spread out in regional offices across the
country, many contractors will seek space around the Quantico due to its relationship with FBI.
Moreover, the FBI growth related to cybersecurity will operate independently of the planned FBI
Headquarters consolidation out of the Hoover Building in downtown Washington, DC. As the FBI HQ
project continues in fits and starts, the agency’s cybersecurity mission must be agile and proactive
- and, most importantly, must find ways to expeditiously deploy the funding provided by Congress.
Leasing related to FBI cybersecurity will necessarily occur outside of the consolidation in order to
preserve speed-to-market efficiency. Cyberattacks affecting American citizens will not wait while
the FBI determines its housing plans.
POCKETS OF GROWTH ALONG FEDERAL INFRASTRUCTURE
The Government will slowly upgrade its cyber infrastructure across the country, creating spurts of
spending growth on an agency by agency basis in primary and secondary CRE markets over the next
decade. Additionally, look for new IT spending requirements in tertiary markets as agencies with
geographically driven mission-related offices receive funding to upgrade their systems.
For example: All FBI regional offices will receive funding to initiate cybercrimes task forces if they
have not done so already. Veterans Affairs clinics will designate increased spending allocations for
cybersecurity upgrades. Department of Energy offices located near critical energy infrastructure
components (damns, renewable energy farms, etc) beef up their security protocols and safeguard
measures. With each spending spurt, expect localized increases in federal real estate demand—
creating small, decentralized space demand hotspots across the country over the next decade.
FORTMEADEROUTE28STAFFORDCOUNTYNATIONAL
DEMAND WILL OCCUR IN SELECT MARKETS WITH PRE-EXISTING INFRASTRUCTURE AND/OR
ESTABLISHED FEDERAL DRIVERS WITH A RELATIONSHIP WITH CYBER RELATED TENANTS.
CYBERGROWTHREGIONSCYBERGROWTHREGIONS
28 29
|BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
“It’s no surprise that
cybersecurity will be
architected out of the same
market where the Internet was
created...Northern Virginia”
HERB MANSINNE
Managing Director,
Brokerage
“In the span of a decade,
the government has
expended over $30 billion
and has hired thousands
of employees dedicated to
cyber, with consistent growth
predicted in the years to
come. However, it may take
a “Pearl Harbor” cyber event
to initiate the type of growth
that has an immediate
“needle moving” impact on
the real estate world.”
JOE BRENNAN
Managing Director,
Government Investor
Services
“Demand from cyber-related
firms seeking space in the
Metro area has significantly
increased over the past
12 months. Many of the
Silicon Valley-based firms
are seeking outposts in the
Metro area in order to work
on federal contracts related
to cybersecurity initiatives.
Firms are specifically focused
on the Toll Road market given
the proximity to Dulles, target
employee demographics and
visible signage opportunities”
JAY FARMER
Managing Director,
Brokerage
“The increase in
cybersecurity spending and
employment has fueled
record-setting multifamily
absorption in Washington,
DC. More than 14,000
apartment units were newly
occupied in the 12 months
ending June 2015 - an
all-time record and almost
double the annual average.”
CHRIS ESPENSHADE
Managing Director,
Capital Markets
“The typical cybersecurity
focused tenant uses
less space per person.
This is driven by the
utilization of benching
due to the necessity of
maintaining an open office
environment. However, the
lower physical build-out
costs are often offset by
increased infrastructure and
connectivity, i.e.,
soft requirements.”
CHRIS MOLIVADAS
Managing Director,
Project Development
Services
“In Prince William, Loudoun
and Fairfax Counties
enterprise data centers have
leased or purchased over
2.0M SF of conventional
warehouse space,
representing nearly 10% of
the industrial inventory in
those markets. The 2.0M SF
are done deals. This 2.0M
SF does not include the data
centers being built by DuPont
Fabros, Equinix, Digital Realty
Trust, Sabee and more. “
JOHN DETTLEFF
SVP, Brokerage
PERSPECTIVES ON THE BROADER CYBER
IMPACT FROM THE JLL INVESTOR SUITE
AGENCYLEASING
FEDERALCRE
CYBERIMPACTONTHECAPITALMARKETS
TENANTREPRESENTATION
MULTIFAMILY
DEVELOPMENT
INDUSTRIAL
he Capital Markets have
responded favorably to the riseof cybersecurity as a nationaldefense priority due to theopportunity to create andretain value. The investing and
lending communities have demonstrated that they
are beginning to place a premium on assets withcybersecurity-related tenants.
The reason behind this increase in confidence is
the certainty of renewal created by the specialized
nature of the properties and clear growth trajectory
in the sector. Federal cybersecurity spending has
increased 56.6% since 2011 despite an 11.6%decline in federal contract spending during thesame period. No other defense initiative hasclearer spending priority in the federal, state and
local budgets.
On top of the initial tenant improvement allowance,
cyber-related tenants create highly-specializedfacilities through additional capital investment inconnectivity to specific fiber lines, SCIF build-outs
and other infrastructure enhancements. Thesignificant capital expended through the firstseveral years of the lease indicates a long-termcommitment to the space due to the inability to
endure the downtime and significant investment
associated with a relocation. As a result, cyber-related leasing has received less scrutiny thanstandard federal leasing, for example, in one recent
lease, the GSA self-funded over $200 per squarefoot in tenant improvements.
Sophisticated buyers have begun to understandthat cyber-related tenants with shorter firm terms
may actually have higher renewal potentials thanother federal users in traditional office spaceunder longer term leases. Buyers are placing anincreased emphasis on the specialized nature ofcyber-related installations and are underwritinghigher renewal probabilities and capturing theadditional resulting value. As a result, cap ratesare being driven by a combination of the remaining
term and the specific agency and mission.
The bottom line: assets with cybersecurityrelated tenants are not commodity office space– the specialized nature of these facilities isan indication of tenant commitment to thestrategically located properties – all coalescingin a strong story and “hook” that increases buyer
interest, and ultimately asset value.
T
30 31
MARC RAMPULLAEVP, Capital MarketsGovernmentSolutions
BRIAN SAAL
VP, Capital Markets
GovernmentSolutions
This glossary1
is a collection of commonly-used cyber-related terms. It is meant as a
primer for understanding basic industry terminology. For the purposes of this list, terms
have been divided into either Offensive or Defensive connotations—although many of the
terms can apply to both characterizations.
We are providing this glossary to enable you to navigate this report as we explore the
complicated, often esoteric, world of cybersecurity.
1
Terms and definitions adapted from the National Initiative for Cybersecurity Careers and Studies.
CYBER GLOSSARY
ANTISPYWARE SOFTWARE –
A program that specializes in
detecting and blocking or removing
forms of spyware.
CLOUD COMPUTING –
An on-demand network of
“shared pool” computing resources.
COMPUTER NETWORK DEFENSE –
The actions taken to defend
against unauthorized activity within
computer networks.
CRITICAL INFRASTRUCTURE –
The systems and assets, whether
physical or virtual, so vital to society
that the incapacity or destruction of
such may have a debilitating impact on
the security, economy, public health or
safety, environment, or any combination
of these matters
CYBERSECURITY – Protecting
computers, mobile devices, tablets,
networks, programs and data from
unauthorized access or manipulation.
CYBERSPACE – The interdependent
network of information technology
infrastructures. Cyberspace includes
the Internet, telecommunications
networks, computer systems, and
embedded processors and controllers.
DARK FIBER NETWORK –
A privately operated network of optical
fiber cabling that is used for secure and
direct communication and data exchange
between facilities
DIGITAL FORENSICS –
Gathering, retaining and analyzing
system-related data (digital evidence)
for investigative purposes.
FIREWALL – A capability to limit network
traffic between information systems.
NETWORK RESILIENCE – The ability of
a network to:
1.	 Provide continuous operation.
2.	 Recover effectively if failure
does occur.
3.	 Scale to meet rapid or
unpredictable demands.
REDUNDANCY – Additional systems,
assets or processes that maintain a
degree of overall functionality in case
of loss or failure of another system.
SCIF – Sensitive Compartmented
Information Facility - an enclosed area
within a building that is used to process
classified information.
DEFENSIVECYBER
ATTACK (CYBERATTACK) – An attempt
to gain unauthorized access to system
services, resources, or information, or an
attempt to compromise system integrity.
There are 5 main attack types:
1.	 PHISHING – An attack designed
to deceive individuals into
providing sensitive information.
2.	 MALWARE – Software that
compromises the operation
of a system by performing an
unauthorized function or process.
3.	 TROJAN HORSE – A computer
program that appears to have a
useful function, but also has a
hidden and potentially malicious
function that evades security
mechanisms.
4.	 SPOOFING – Faking the sending
address of a transmission to gain
unauthorized entry into a
secure system.
5.	 DENIAL OF SERVICE –
An attack that prevents or impairs
the authorized use of resources or
services.
BOT – A computer connected to the
Internet that has been compromised
with malicious intent to perform activities
under remote control.
BOTNET – A collection of computers
compromised by malicious code and
controlled across a network.
CYBERTHREAT – The possibility of a
malicious attempt to damage or disrupt a
computer network or system.
DATA BREACH – The unauthorized
movement or disclosure of sensitive
information to a party that is not
authorized to have or see the information.
DATA MINING – The process or
techniques used to analyze large
sets of existing information to discover
previously unrevealed patterns
or correlations.
HACKER – An unauthorized user
who attempts to or gains access to an
information system.
KEYLOGGER – Software or hardware
that tracks keystrokes, usually secretly,
designed to be monitored by an
alternate user.
SPAM – The abuse of electronic
messaging systems to indiscriminately
send unsolicited bulk messages.
SPYWARE – Software that is secretly
installed into an information system
without the knowledge of the system
user or owner.
THEFT – The primary goal of hackers,
cyber-related theft typically is either:
1.	 IDENTITY THEFT
2.	 INTELLECTUAL PROPERTY
THEFT (i.e. patents, trademarks,
trade secrets and copyrights)
VIRUS – A computer program that can
replicate itself, infect a computer without
permission or knowledge of the user,
and then spread or propagate to another
computer.
ZERO-DAY ATTACKS – An attack
that exploits a previously unknown
vulnerability in a computer application or
operating system, one that developers
have not had time to address and patch.
OFFENSIVECYBER
32 33
JLL (NYSE: JLL) is a professional services and investment management firm
offering specialized real estate services to clients seeking increased value by
owning, occupying and investing in real estate. A Fortune 500 company with
annual fee revenue of $4.7 billion and gross revenue of $5.4 billion, JLL has
more than 230 corporate offices, operates in 80 countries and has a global
workforce of approximately 58,000. On behalf of its clients, the firm provides
management and real estate outsourcing services for a property portfolio of 3.4
billion square feet, or 316 million square meters, and completed $118 billion in
sales, acquisitions and finance transactions in 2014. Its investment management
business, LaSalle Investment Management, has $56.0 billion of real estate
assets under management. JLL is the brand name, and a registered trademark,
of Jones Lang LaSalle Incorporated. For further information, visit www.jll.com.
The Government Investor Services team at Jones Lang LaSalle is the premier
provider for comprehensive federal real estate advisory services. Combining
deep market experience and political tradecraft with superior research and
financial analysis, we create certainty for our clients—driving value and
confidence in an increasingly complex federal marketplace.
Contact information
©2015 Jones Lang LaSalle IP, Inc. All rights reserved. No part of this publication may be reproduced by any means, whether graphically, electronically, mechanically or otherwise howsoever, including without limitation photocopying and recording on
magnetic tape, or included in any information store and/or retrieval system without prior written permission of Jones Lang LaSalle. The information contained in this document has been compiled from sources believed to be reliable. Jones Lang LaSalle
or any of their affiliates accept no liability or responsibility for the accuracy or completeness of the information contained herein and no reliance should be placed on the information contained in this document.
Joseph Brennan
Managing Director
+1 202 719 5606
joseph.brennan@am.jll.com
Brian Saal
Vice President
+1 202 719 5831
brian.saal@am.jll.com
1801 K Street NW
Suite 1000
Washington, DC 20006
+1 202 719 5000
jll.com/dc
Brian Sullivan
Managing Director
+1 202 255 7138
brian.sullivan@am.jll.com
Jeff Hurvitz
Associate
+1 202 719 5670
jeff.hurvitz@am.jll.com
Art Turowski
Senior Vice President
+1 202 719 6176
arthur.turowski@am.jll.com
Colleen Hollowood
Brokerage Assistant
+1 202 719 5877
colleen.hollowood@am.jll.com
Lucy Kitchin
Senior Vice President
+1 202 719 5752
lucy.kitchin@am.jll.com
Sarina Singh
Associate
+1 202 719 5739
sarina.singh@am.jll.com
About JLL About JLL Government Investor Services

More Related Content

What's hot

Cybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideCybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideBenjamin Tugendstein
 
Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future Agenda
 
Achieving Compliance and Transparency in the Public Sector IP final
Achieving Compliance and Transparency in the Public Sector IP finalAchieving Compliance and Transparency in the Public Sector IP final
Achieving Compliance and Transparency in the Public Sector IP finalMichael Gandy
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Trends in the use of marketing real estate
Trends in the use of marketing real estateTrends in the use of marketing real estate
Trends in the use of marketing real estateNits Kedia
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
China Industrial Policy Brief
China Industrial Policy BriefChina Industrial Policy Brief
China Industrial Policy BriefRene Summer
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALLouise Collins
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015Andy Kim
 
RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB CybersecurityAndy Kim
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Anthony Rapa
 

What's hot (19)

Cybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideCybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection Guide
 
Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15 Future of Privacy - The Emerging View 11 06 15
Future of Privacy - The Emerging View 11 06 15
 
BT Cloud Security Whitepaper
BT Cloud Security WhitepaperBT Cloud Security Whitepaper
BT Cloud Security Whitepaper
 
Achieving Compliance and Transparency in the Public Sector IP final
Achieving Compliance and Transparency in the Public Sector IP finalAchieving Compliance and Transparency in the Public Sector IP final
Achieving Compliance and Transparency in the Public Sector IP final
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Trends in the use of marketing real estate
Trends in the use of marketing real estateTrends in the use of marketing real estate
Trends in the use of marketing real estate
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
China Industrial Policy Brief
China Industrial Policy BriefChina Industrial Policy Brief
China Industrial Policy Brief
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
 
RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB Cybersecurity
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016
 
Cyber Readiness Index 2.0
Cyber Readiness Index 2.0Cyber Readiness Index 2.0
Cyber Readiness Index 2.0
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Research Paper
Research PaperResearch Paper
Research Paper
 

Viewers also liked

JLL City Report Nairobi Kenya - April 2016
JLL City Report Nairobi Kenya - April 2016JLL City Report Nairobi Kenya - April 2016
JLL City Report Nairobi Kenya - April 2016Fadheelat Noor Mohamed
 
JLL-The new industrial revolution_final
JLL-The new industrial revolution_finalJLL-The new industrial revolution_final
JLL-The new industrial revolution_finalAlexandra Tornow
 
Global market perspective q3-2013
Global market perspective q3-2013Global market perspective q3-2013
Global market perspective q3-2013World Office Forum
 
Hotel Destinations Mar 2016
Hotel Destinations Mar 2016Hotel Destinations Mar 2016
Hotel Destinations Mar 2016JLL Thailand
 
Jll a-new-era-of-coworking-2016
Jll a-new-era-of-coworking-2016Jll a-new-era-of-coworking-2016
Jll a-new-era-of-coworking-2016Fernando Herrera
 
JLL’s perspective on top 10 global corporate real estate (CRE) trends for 2016
JLL’s perspective on top 10 global corporate real estate (CRE) trends for 2016JLL’s perspective on top 10 global corporate real estate (CRE) trends for 2016
JLL’s perspective on top 10 global corporate real estate (CRE) trends for 2016JLL
 
CURRICULUM VITAE of VVHermo (v2)
CURRICULUM VITAE of VVHermo (v2)CURRICULUM VITAE of VVHermo (v2)
CURRICULUM VITAE of VVHermo (v2)Vivian Hermo
 
Fujifilm Cloudnet Mcp Brochure
Fujifilm Cloudnet Mcp BrochureFujifilm Cloudnet Mcp Brochure
Fujifilm Cloudnet Mcp BrochureMichael Mostyn
 
TE CONNECTIVITY WEBINAR DECK 121015
TE CONNECTIVITY WEBINAR DECK 121015TE CONNECTIVITY WEBINAR DECK 121015
TE CONNECTIVITY WEBINAR DECK 121015Brian Risser
 
Expeditors International of Washington 8-k_03-17-09
Expeditors International of Washington 8-k_03-17-09Expeditors International of Washington 8-k_03-17-09
Expeditors International of Washington 8-k_03-17-09finance39
 
Corker - Annual report for calendar 2014
Corker - Annual report for calendar 2014Corker - Annual report for calendar 2014
Corker - Annual report for calendar 2014quoththeraven
 
CloudNet Mcp For PSP Presentation
CloudNet Mcp For PSP PresentationCloudNet Mcp For PSP Presentation
CloudNet Mcp For PSP PresentationMichael Mostyn
 
.expeditorsClass_Action_Press_Release
.expeditorsClass_Action_Press_Release.expeditorsClass_Action_Press_Release
.expeditorsClass_Action_Press_Releasefinance39
 
PTC 14 O&M Overview Final
PTC 14 O&M Overview FinalPTC 14 O&M Overview Final
PTC 14 O&M Overview FinalSCCLA
 
Telenor Group
Telenor GroupTelenor Group
Telenor GroupAtifDar
 
Telenor Group company presentation Q4-2013
Telenor Group company presentation Q4-2013Telenor Group company presentation Q4-2013
Telenor Group company presentation Q4-2013Telenor_Group
 
REPORT ON Grameen Phone
REPORT ON Grameen PhoneREPORT ON Grameen Phone
REPORT ON Grameen PhoneAl Shahriar
 
Ims10 ims mobile - IMS UG May 2014 Sydney & Melbourne
Ims10   ims mobile - IMS UG May 2014 Sydney & MelbourneIms10   ims mobile - IMS UG May 2014 Sydney & Melbourne
Ims10 ims mobile - IMS UG May 2014 Sydney & MelbourneRobert Hain
 

Viewers also liked (20)

JLL City Report Nairobi Kenya - April 2016
JLL City Report Nairobi Kenya - April 2016JLL City Report Nairobi Kenya - April 2016
JLL City Report Nairobi Kenya - April 2016
 
Bogotá, 2014 Q4 - JLL
Bogotá, 2014 Q4 - JLLBogotá, 2014 Q4 - JLL
Bogotá, 2014 Q4 - JLL
 
JLL-The new industrial revolution_final
JLL-The new industrial revolution_finalJLL-The new industrial revolution_final
JLL-The new industrial revolution_final
 
Global market perspective q3-2013
Global market perspective q3-2013Global market perspective q3-2013
Global market perspective q3-2013
 
Hotel Destinations Mar 2016
Hotel Destinations Mar 2016Hotel Destinations Mar 2016
Hotel Destinations Mar 2016
 
Jll a-new-era-of-coworking-2016
Jll a-new-era-of-coworking-2016Jll a-new-era-of-coworking-2016
Jll a-new-era-of-coworking-2016
 
JLL’s perspective on top 10 global corporate real estate (CRE) trends for 2016
JLL’s perspective on top 10 global corporate real estate (CRE) trends for 2016JLL’s perspective on top 10 global corporate real estate (CRE) trends for 2016
JLL’s perspective on top 10 global corporate real estate (CRE) trends for 2016
 
CURRICULUM VITAE of VVHermo (v2)
CURRICULUM VITAE of VVHermo (v2)CURRICULUM VITAE of VVHermo (v2)
CURRICULUM VITAE of VVHermo (v2)
 
Fujifilm Cloudnet Mcp Brochure
Fujifilm Cloudnet Mcp BrochureFujifilm Cloudnet Mcp Brochure
Fujifilm Cloudnet Mcp Brochure
 
TE CONNECTIVITY WEBINAR DECK 121015
TE CONNECTIVITY WEBINAR DECK 121015TE CONNECTIVITY WEBINAR DECK 121015
TE CONNECTIVITY WEBINAR DECK 121015
 
Expeditors International of Washington 8-k_03-17-09
Expeditors International of Washington 8-k_03-17-09Expeditors International of Washington 8-k_03-17-09
Expeditors International of Washington 8-k_03-17-09
 
Corker - Annual report for calendar 2014
Corker - Annual report for calendar 2014Corker - Annual report for calendar 2014
Corker - Annual report for calendar 2014
 
CloudNet Mcp For PSP Presentation
CloudNet Mcp For PSP PresentationCloudNet Mcp For PSP Presentation
CloudNet Mcp For PSP Presentation
 
.expeditorsClass_Action_Press_Release
.expeditorsClass_Action_Press_Release.expeditorsClass_Action_Press_Release
.expeditorsClass_Action_Press_Release
 
PTC 14 O&M Overview Final
PTC 14 O&M Overview FinalPTC 14 O&M Overview Final
PTC 14 O&M Overview Final
 
Telenor Group
Telenor GroupTelenor Group
Telenor Group
 
Telenor Group company presentation Q4-2013
Telenor Group company presentation Q4-2013Telenor Group company presentation Q4-2013
Telenor Group company presentation Q4-2013
 
REPORT ON Grameen Phone
REPORT ON Grameen PhoneREPORT ON Grameen Phone
REPORT ON Grameen Phone
 
Telenor Case Study
Telenor Case StudyTelenor Case Study
Telenor Case Study
 
Ims10 ims mobile - IMS UG May 2014 Sydney & Melbourne
Ims10   ims mobile - IMS UG May 2014 Sydney & MelbourneIms10   ims mobile - IMS UG May 2014 Sydney & Melbourne
Ims10 ims mobile - IMS UG May 2014 Sydney & Melbourne
 

Similar to CyberSecurityBook[Final]

Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Jason Fernandes
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Frank Backes
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity PredictionsMatthew Rosenquist
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxbriancrawford30935
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioJLL
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agendanationalconsumersleague
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPPhilippe Boivineau
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityPaul Ferrillo
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docxhallettfaustina
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icsNumaan Huq
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icsThomas Hughes
 

Similar to CyberSecurityBook[Final] (20)

Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-ics
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-ics
 

CyberSecurityBook[Final]

  • 2.
  • 3. 2005 2007 2009 2013 2015 Hackers target the point-of-sale system of Walmart and access sensitive information, revealing that the nation’s largest retailer had a number of significant security vulnerabilities including storing at least four years’ worth of unencrypted credit card information. 2005 A June 2007 network intrusion at the Pentagon resulted in the theft of sensitive Department of Defense data, including information regarding the processes and procedures of the DoD that were deemed valuable to adversaries. 2007 Several U.S. Government websites – including those of the White House, State Department and The Pentagon – experience a “distributed denial of service” attack that takes the sites down for several days. 2009 Farmers Insurance, MasterCard, and several high-level government sites are hacked and several thousand usernames and logins, as well as other confidential information was released. 2012 An attack on the point-of-sale system used by Target, the nation’s second largest retailer, results in 40 million credit and debit card numbers being compromised. 2013 The U.S. Office of Personnel Management is hacked, with a total of 21.5 million social security numbers and 5.6 million fingerprint records compromised. Government-sponsored Chinese hackers have been identified as the likely source. Hackers gain access to BlueCross’ system for over six months, exposing 11 million members’ names, dates of birth, Social Security numbers, bank account information and other sensitive information. Anthem, one of the nation’s largest health insurers, announces that the detailed personal information of as many as 80 million current and former customers was compromised. 2015 A group of Chinese hackers orchestrate a sophisticated targeted attack on corporate infrastructure of Google and at least 20 other large companies. Access to the email accounts of several Chinese human rights activists were compromised. 2010 2011 THERISINGTIDEOFCYBERSECURITY Graphic source: Google searches for cybersecurity over time Hackers gain access to T.J. Maxx and Marshalls’ 45 million credit/debit card and check information. The company later paid a $9.75 million settlement in a class action lawsuit over the breach. 2006 “The most significant breach of U.S. military computers ever” occurred when a flash drive infected by a foreign intelligence agency uploaded malicious code to a central military network. The incident led to the creation of the U.S. Cyber Command in 2009. Hackers target an oil pipeline in Turkey and inject malicious software that allows them to tamper with the system – causing an explosion that sent flames 150 feet into the air. 2008 An “external intrusion” sends the Sony PlayStation Network offline, and compromises personally identifying information (including credit card details) of its 77 million accounts, in what is one of the largest data breaches ever. Bank of America website hacked by a lone Turkish hacker – estimated 85,000 credit card numbers and accounts stolen. 2011 Sony Pictures Entertainment experienced one of the most devastating corporate attacks in history. Leaked files included personal details of around 6,000 Sony employees, upcoming Sony feature films and the salary details of top executives. The Bitcoin exchange Mt.Gox filed for bankruptcy after $460 million was apparently stolen by hackers due to “weaknesses in [their] system”. 2014 JLL’s Government Investor Services (GIS) team closely tracks issues that impact federally-leased real estate. With over $32 billion spent in the past decade and trillions more planned for decades to come, cybersecurity will renew federal leasing velocity in ways not seen since the stimulus package of 2009. In an effort to educate our clients and provide the substantive analysis the owner/investor community has come to expect from our practice group, GIS has prepared a comprehensive report on cybersecurity. This is a topic that brings up many questions and as thought leaders in this space, we provide answers and informed guidance. In this original book, GIS outlines the threat, details the legislative history, identifies the agencies leading the Government’s cybersecurity efforts, provides agency-by-agency budget breakdowns, and, most importantly, examines the potential impact this transformative movement is going to have on your federally- leased asset or potential acquisition. he global cybersecurity market is currently worth more than $107 billion and is expected to grow to over $170 billion by 2020–an annual growth rate of almost 10%. The effects of this rate of growth on the U.S. economy should be meaningful and, potentially, transformative. As the largest practice group of its kind in the country, HOW DID WE GET HERE? MORE THAN A NEWS STORY T
  • 4. INTRODUCTION....................................................................................1 THE INFRASTRUCTURE LANDSCAPE............................................ 2 CYBER THREATS BY INDUSTRY...................................................... 4 PROPOSED LEGISLATIVE IMPACT ON REAL ESTATE................... 6 GOVERNMENT CYBER OVERVIEW..................................................8 CYBER SPENDING BY AGENCY.......................................................16 FORECAST..........................................................................................28 INDUSTRY PERSPECTIVES ON CYBER IMPACT.........................30 CYBER GLOSSARY............................................................................32 TABLEOFCONTENTS
  • 5. |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST| he federal real estate market has experienced a significant decrease in demand in the first half of this decade. Executive mandates requiring reduction in space consumption; Congressional consensus regarding per person space utilization compression and/or increase in teleworking among federal employees, have all coalesced into an unprecedentedly flat demand horizon. While the government focuses on austerity and reduction in federal space consumption, there is, however, an area of growth emerging with not only public economic impact, but impact on the macro economy and the private sector. Cybersecurity, cyberwarfare and the ripple effects of cyber focused growth spending will be felt all over the Washington region and around the country. This report explores and explains cybersecurity as a policy movement and the potential impact its implementation could have on the federally-leased commercial real estate market. The complicated infrastructure of networks that deliver and protect information in the cyber age intertwine the destinies of all industries and institutions. An attack on one network is an attack on all. Recognizing this fragile interdependency, the federal government has begun to allocate spending and resources across the entire federal spectrum. In an effort to coordinate an organized response, the government has assigned various agencies responsibilities based on how closely their mission matches the threat posed by the type of attack. Moreover, several pieces of legislation have been introduced to Congress that seek to promote the coordination of existing agencies to lead the response and create new ones to aid in this charge. Most importantly, however, the bills seek to confirm financial commitment to the nation’s cybersecurity efforts by appropriating funding to augment the current response apparatus and recruit experts to ensure that the U.S. remains at the forefront of cybersecurity, both offensively and defensively. DEFININGCYBER The impact on your commercial real estate portfolio T This book examines the ways in which cyberthreats are handled by our three most important sectors: military, intelligence and civilian. Each domain handles the threats and response coordination uniquely because in each one the goals are decidedly different. As always, federal priorities come into sharp focus when analyzing the amount of spending available to various response units. This report breaks down this spending on an agency by agency basis and provides not only a rationale for it but predicts the way in which this spending will affect specific agencies’ real estate portfolios. Lastly, in the forecast section, GIS interpolates the statistics and information included hereto and offers specific predictions on cyber’s impact on federally-leased real estate both locally and nationally. The predictions also include insight in areas of real estate not limited to federally- leased assets as JLL colleagues across all disciplines weigh in on cyber’s impact across all product types. GIS hopes that the information in this report provides our investor clients valuable insight into the future of their federally-leased assets or potential acquisitions. 1
  • 6. COMMUNICATIONS odern life consists of a continuous series of invisible negotiations with vast networks of electronic infrastructure that control the way we recognize, process and disseminate information. In other words, all of the things that we rely on every day rely on the things that we cannot see. While the past decade has represented exponential technological advancements in the way in which we communicate and the speed at which that communication occurs, it has also introduced new and dangerous vulnerabilities. The “War on Terror” presented the country with a living and breathing enemy and, thus, a blueprint for homeland defense; conversely, the threat of cybersecurity arrives in the form of an invisible enemy. This new type of threat requires a new and creative response. As it has done so many times in the past when prevailed upon to respond to ever evolving threats and enemies, the U.S. Government has responded with vigor, ingenuity, and, most importantly, money. This response is still in its gestation period but the net result is typically federal: new agencies, increased funding, increased collaboration, increased scrutiny and a search for innovation. For owners and investors of federally-leased assets, it is imperative to understand the relationship your tenant has to the Government’s response to cybersecurity. For the private sector, understanding your tenants’ cyber-related role will give you a competitive edge in the market as their space needs over the coming decades can be affected by what kind of attack they are guarding against. Each major industry will care about different types of cyber threats and the various agencies that are involved in protecting them. THE INFRASTRUCTURE LANDSCAPE WHAT WE RELY ON EVERY DAY RELIES ON THE THINGS WE CANNOT SEE M 2 3 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 7. o two cyber attacks are the same and this is a fact recognized by the Federal Government. The type of information at risk due to a data breach attack on a bank or financial institution is very different than one on a nuclear power plant. As outlined in the accompanying graph, the Government has organized the threat response on an industry-by-industry basis. Various agencies are assigned responsibilities based on how closely their mission matches the threat posed by the type of attack. For owners and investors of federally-leased assets, the implications are broad. Anecdotal inferences about whether a tenant is potentially involved in the cybersecurity initiative may prove insufficient as many agencies have been tasked with cyber responsibilities. For example, the Small Business Administration (SBA) and Federal Trade Commission (FTC) are both critical to the protection of various financial industry sectors, a fact perhaps not immediately intuitive. Nevertheless, many agencies will grow in correspondence to the size of the threat they protect and occupancy behavior should be tracked by owners and investors accordingly. Moreover, although naturally headquartered in Washington, DC, the cybersecurity response is a national threat and most of the agencies identified throughout this report have offices across the entire country. Owners should expect that cyber growth will be nationwide though with a disproportionate amount occurring in the Washington metro. CYBER THREATS BY INDUSTRY N NEWS CYBER THREATS FACED: PHISHING, ZERO-DAY ATTACKS AND DATA BREACHES Assigned agency support: Federal Communications Commission (FCC) Federal Trade Commission (FTC) RETAIL CYBER THREATS FACED: OPEN WIFI, POINT-OF-SALE COMPROMISE AND DATA BREACH Assigned agency support: Federal Bureau of Investigation (FBI) US Secret Service (USSS) Consumer Products Safety Commission (CPSC) BANKS CYBER THREATS FACED: DENIAL-OF-SERVICE, FRAUD, BOTNETS AND WEB AUTHENTICATION ATTACKS Assigned agency support: US Secret Service (USSS) Department of Treasury Office of the Comptroller of the Currency (OCC) Securities and Exchange Commission (SEC) Consumer Financial Protection Bureau (CFPB) HOSPITALITY CYBER THREATS FACED: POINT-OF-SALE COMPROMISE (CREDIT CARDS), OPEN WIFI AND ADMIN ACCOUNTS Assigned agency support: US Secret Service (USSS) WEBSITES CYBER THREATS FACED: MALICIOUS CODE INJECTION AND EXCLUSION FROM CORE SECURITY Assigned agency support: National Programs and Protectorate Directorate (NPPD) Department of Homeland Security (DHS) Federal Communications Commission (FCC) DEFENSE/ INDUSTRIAL SECTOR CYBER THREATS FACED: ZERO-DAY HACKS, REMOTE ACCESS AND PHISHING Assigned agency support: Department of Defense (DoD) National Protection and Programs Directorate (NPPD) CREDIT CARD PROCESSING CYBER THREATS FACED: PHISHING AND EGRESS TRAFFIC AND DATA BREACH Assigned agency support: Internal Revenue Service (IRS) Consumer Product Safety Commission (CSPC) Department of Treasury Federal Bureau of Investigation (FBI) US Secret Service (USSS) SMALL MEDIUM BUSINESSES CYBER THREATS FACED: CREDIT CARDS, PHISHING, POINT-OF-SALE COMPROMISE Assigned agency support: Federal Bureau of Investigation (FBI) Small Business Administration (SBA) Department of Treasury CYBER: IMMUNE FROM REDUCTION? Although agencies have been directed to freeze, and subsequently reduce, the footprint of their leased portfolio, new responsibilities related to cybersecurity may make it difficult to do so. As agencies seek to implement new policies and regulations in accordance with cyber initiatives, new hires may make space reduction no longer feasible as the Government fits more personnel into the same amount of leased space. Although many of these hires may not cause net new expansion, investors may see less reduction than anticipated as agencies implement cyber mandates. 4 5 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 8. COMPREHENSIVE NATIONAL CYBERSECURITY INITIATIVE Declassified in 2010, the Comprehensive National Cybersecurity Initiative (CNCI) was launched in January of 2008 to protect government computer systems and begin to address the protection of private sector cyber systems. CNCI covers a range of programs—from research and development and promoting cyber education to the first complex federal effort to develop deterrence strategies in cyberspace. Some of CNCI remains classified, such as detailed descriptions of the government’s cyber offense capabilities. Additionally, the declassification of CNCI was the first federal public disclosure of the role of the National Security Agency in one monitoring program—three years before the Edward Snowden leaks. CNCI laid the foundation for most cyber related federal expansion in 2009 and beyond. 2008 EXECUTIVE ORDER: IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY This 2013 Executive Order solidified the Department of Homeland Security (DHS) as the primary shepherd of civilian-focused cybersecurity operations for the federal government. While the Department of Defense had undergone over a decade of aggressive cyber expansion, organizing and expanding the civilian side of federal cyber was still in its infancy—and it now had a face: DHS. The Improving Critical Infrastructure Cybersecurity Executive Order aimed to promote and incentivize the adoption of cybersecurity practices across all Executive Branch agencies. The Executive Order directed agency heads to work with DHS to share information regarding cyberthreats and security. Simultaneous to releasing the above Executive Order, the Obama Administration released a 2013 Presidential Policy Directive (PPD) titled “Critical Infrastructure Security and Resilience” designed to strengthen the physical and cyber resilience of the nation’s critical infrastructure. 2013 NATIONAL CYBERSECURITY PROTECTION ACT The most significant harbinger of bipartisan support for federal cyber expansion, this 2014 Act was passed in the Democratic controlled Senate and then, within the same week, was passed unanimously in a Republican controlled House. The Act was heralded as the most significant cyber bill to pass Congress in over a decade. The main aim of the Act was to codify the existing cybersecurity and communications operations center at DHS, known as the National Cybersecurity and Communications Integration Center (NCCIC). NCCIC provides a platform for the government and private sector to share information about cybersecurity threats, incident response and technical assistance. The Act requires NCCIC to include representatives of federal agencies, state and local governments and private sector owners and operators of critical information systems. The Act also delegates implementation authority for defense-related and intelligence-related information security to the Secretary of Defense and the Director of National Intelligence, respectively.2014 DHS CYBERSECURITY WORKFORCE RECRUITMENT AND RETENTION ACT The DHS Cybersecurity Workforce Recruitment and Retention Act focuses on strengthening the federal government’s cybersecurity workforce. The bill aims at improving hiring procedures and compensation ranges for cybersecurity positions at DHS. Under the provisions of the bill, DHS is required to pay cybersecurity workers salaries similar to those of the cybersecurity positions in the Defense Department. The bill also requires DHS to file annual reports on its recruitment and retention of cybersecurity workers. The bill (and its sister bill, the Cybersecurity Workforce Assessment Act) have been passed by both the House and the Senate and await the President’s signature. The latter bill would require DHS to conduct an assessment of its cybersecurity workforce every three years, in addition to developing a strategy for enhancing the recruitment and training of cybersecurity employees. Both bills would boost DHS’ ability to competitively hire cybersecurity professionals, a possible boon for DHS’ future leased space needs. 2014 apitol Hill has been aware of the importance of protecting America’s military and domestic technology infrastructure for some time but the focus has sharpened and gained momentum since the beginning of this decade. This legislative history of cybersecurity is described on the next page, but the most compelling aspect of the set of policy initiatives is the level of funding commitment represented. In an era when both Republicans and Democrats are seeking to minimize federal spending at home and abroad. The resources allocated, on a bipartisan basis, to fighting cyber threats provide evidence of real and enduring financial commitment. PROPOSED LEGISLATIVE IMPACT ON REAL ESTATE C 2009 2010 20 11 2012 2013 20142008 AGENCYCREATEDAGENCYCREATED RECRUITMENTPRIORITIZEDDHSPUTINCHARGE 6 7 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 9. GOVERNMENTCYBER Overview PROTECT THE MILITARY In 2013, the Office of the Director of National Intelligence (ODNI) named “cyberthreats” as number one on the International Strategic Threat List. This is the first time in 10 years something else was listed as more threatening to the security of the United States than terrorism. Cybersecurity remains the top priority as over half of the Federal Government’s cyber spending is devoted to military-related cyber priorities. Whether focused on detecting threats within internal networks or disrupting the U.S.’s enemies’ ability to use their own network and infrastructure, the Department of Defense has invested heavily in its cyberspace operations. MILITARY COLLECTION DISSEMENATION Tasked as the primary coordinator of the cyber activities between the intelligence, law enforcement and military agencies, the intelligence community’s cyber program is continuously evolving. To keep up with the latest iteration of the threats facing the nation, the intelligence community has shifted from a focus on internal cybersecurity and control of its own network infrastructure, toward a focus on cyber-offensive capabilities. This comes at a time when the government’s priorities are shifting away from wars in Iraq and Afghanistan towards data collection and defensive espionage. Thus, digital spying is extremely important. INTELLIGENCE PROTECT THE CIVILIANS Until 2009, the federal government did not have a domestic interagency, coordinated cyber plan. Therefore, each individual agency was forced to formulate its own cyber budget, priorities and best practices. DHS and the FBI have been delegated by the Administration as primary coordinators for non-military – i.e. “civilian” federal government cyber initiatives. Both agencies are seeking to streamline the way the federal government protects itself from cyber threats --with varying degrees of success. The civilian third of the federal government’s cyber strategy is, comparatively, still in its infancy so goals and priorities are constantly evolving making the status more difficult to track. CIVILIAN IN THE WORLD OF GOVERNMENT, CYBER FALLS INTO THREE CATEGORIES: MILITARY, INTELLIGENCE AND CIVILIAN. IN THE FOLLOWING SECTION, WE DESCRIBE THE VARIOUS WAYS THESE SECTORS DEAL WITH CYBERSECURITY AND CYBERTHREATS. 8 9 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 10. epartment of Defense response to cybersecurity has its origins in BRAC Legislation. Under DoD’s latest Base Realignment and Closure Act, DoD sought to organize and consolidate real property according to mission. Several military bases were designated as receiver bases for Information and Cyber Technology – for example, Maryland’s Fort Meade. To that end, DoD policy on cybersecurity represents a continuation of the changes initiated under BRAC. Bases with components responsible for defending against cyber threats and focused on intelligence gathering will continue to experience growth, and land and office vacancy located at or near these bases will have the opportunity to capture lease demand as federally-owned bases struggle to catch facility infrastructure up with the growth. MILITARY: BUILDING A CYBER ARMY D CYBER AND THE MILITARY: DEPARTMENT OF DEFENSE’S CYBER STRATEGY DOD CYBER: SECURE AND SPECIALIZED WORKSPACE USCYBERCOM stands as one of the few government operations in recent years that have significantly increased their workforce size and subsequent need for housing increased personnel. Unlike many civilian government agencies, the nature of DoD’s cyber mission necessitates highly secure and specialized workspaces that are not subject to the same teleworking initiatives and pressures as the rest of the federal government. BRAC-RELATED CYBER CONSOLIDATION TO FORT MEADE WILL RESULT IN NEW OPPORTUNITIES CHINA Steals intellectual property (IP) from global businesses to benefit Chinese companies and undercut U.S. competitiveness RUSSIA Stealthy in their cyber tradecraft and their intentions are sometimes difficult to discern STATE-SPONSORED CRIMINAL ACTORS Patriotic entities often act as cyber surrogates for states, and non-state entities can provide cover for state-based operators SOPHISTICATED ADVERSARIES INDEPENDENT CRIMINAL ACTORS Considerable threat in cyberspace, particularly to financial institutions, and ideological groups often use hackers to further their political objectives ISIS/ISIL Recruit fighters and disseminate propaganda and have declared their intent to acquire disruptive and destructive cyber capabilities. NORTH KOREA Overt level of hostel threat, though less sophisticated than North Korea. LESS-DEVELOPED ADVERSARIES ISIS/ISIL WHO ARE WE FIGHTING? 10 11 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST| 684 New military jobs 2,915 New civilian jobs 1,764 New contractor positions 62,000 Total cyber related positions at Fort Meade targeted
  • 11. n an increasingly connected world, counterintelligence plays a critical role in enhancing the cybersecurity posture of the United States, as counterintelligence is used to create barriers to entry in an otherwise readily accessible and vulnerable area. The nature of the information that the intelligence community collects and stores means that it is consistently the target of cyber-attacks from a variety of enemies, both organized or decentralized, requiring an increasingly cyber-aware intelligence community workforce and specialized infrastructure. The 2008 Comprehensive National Cybersecurity Initiative created the foundation for a government-wide approach to protecting the nation from cybersecurity threats. As part of it, the National Cyber Investigative Joint Task Force (NCIJTF) was established under Presidential Directive as the steward of the country’s national cybersecurity initiatives. The NCIJTF joins together 19 intelligence (including the National Security Agency (NSA) and DHS), law enforcement and military agencies to coordinate cyber threat investigations. The principle behind NCIJTF is simple: notification of an intrusion to one agency will be notification to all. In addition to NCIJTF, several new intelligence agency groups have been formed over the past several months and years to address the growing need for cybersecurity focus within the government. These groups include the CIA’s Directorate of Digital Innovation and the Cyber Threat Intelligence Integration Center (CTIIC). Just as the NCIJTF is the guiding force behind the government’s cyber initiatives, the DNI is the unifying agency that marries the intelligence community together - and in turn houses several Cyber Intelligence Task Forces that focus the communities’ cyber efforts. Nearly every intelligence agency already contains, or will soon develop, a group that is solely focused on cybersecurity, or in the intelligence community - cyberespionage. INTELLIGENCE: CYBERESPIONAGEIN THE21STCENTURY I THE IMPACTS OF CYBER ON THE INTELLIGENCE COMMUNITY
 CYBER INTELLIGENCE AGENCY MAP CYBERESPIONAGE: GROWTH TIED TO BLACK FIBER The stage is set for major growth in the sector of cyberespionage - with both hiring a new generation of intelligence analysts that are educated in the field of cybersecurity and providing net- new infrastructure and secure space for this mission which, until now, has been limited to Northern Virginia, along the established secure government “black fiber” network. 12 13 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 12. ost of the domestic and civilian cyber capabilities of the Federal Government focus on defensive and investigatory cyber tasks. While military cyber spending is focused under the Department of Defense, the civilian arm of the U.S. cyber network is much harder to understand and map out, as many agencies have taken on various cyber oriented roles as cyber defenses have evolved over time. Over the past couple of decades, there have been two agencies that have emerged as the main stakeholders in the Federal Government’s civilian fight to defend the homeland from cyberthreats. It’s easy to understand why the Federal Bureau of Investigation (FBI) has become a key part of the Government’s defensive cyber response force. Much like with the notorious gangsters and organized crime of the early 20th century and the rise of espionage and sabotage from World War II through the Cold War, the 21st century has brought on an entirely new set of criminal challenges with emerging digital technologies. As the nation’s principal law enforcement agency, the FBI has evolved to combat emerging cybercrimes from nation-states, terrorist organizations and transnational and domestic criminal enterprises. The Department of Homeland Security is responsible for coordinating the overall federal effort to protect the security and resilience of the nation’s critical physical infrastructure (nuclear reactors, dams, hospitals, railroads, etc). As part of that responsibility, DHS also supports critical infrastructure owners and operators in preparing for and protecting against cyber incidents. From 2009-2014, DHS prevented $10 billion in potential losses through cybercrime investigations and arrested more than 5,000 individuals for their participation in cybercrime activities. There are many DHS components that have active cyber functions—most notably the U.S. Secret Service (USSS), National Protection and Programs Directorate (NPPD). CIVILIAN:DEFENDINGTHEHOMELAND M DHS FBI: LAW ENFORCEMENT MEETS CYBER HISTORY In the FY2015 “CRomibus” federal spending bill, GSA was allocated $35 million for designing and beginning development preparations for a new federally-owned campus that will “house federal employees and contractors dedicated to the civilian cybersecurity mission.” This earmark was the first mention of the civilian cyber campus in federal law. Since then, the civilian cyber campus has been a topic highly discussed in the media and is surrounded by intense speculation and confusing misinformation. MISSION Much of the confusion regarding the campus stems from defining “civilian cybersecurity” itself. It is important to note that the campus will be designed to house civilian agencies and private sector contractors. While there will undoubtedly be some critical mission overlapping with the Defense Department, it is very likely the civilian cyber campus will remain a wholly separate entity from the military’s US Cyber Command activities in and around Fort Meade, Maryland. The Department of Homeland Security (DHS) and the Department of Justice (DoJ) have been tasked with coordinating the creation of the civilian cyber campus. Specifically, the National Protection and Programs Directorate (NPPD; for DHS) and the Federal Bureau of Investigation (FBI; for DoJ) will be the two agencies around which the civilian cyber campus will be designed. Two other agencies—the Office of Intelligence Analysis (IA) on behalf of the Intelligence Community and the US Secret Service (a division of DHS)—will also be deeply involved with the evolving civilian cyber mission moving forward. IMPACT Additional confusion surrounds exactly which agencies would be involved in the consolidation—and which leases are at risk for consolidation? Currently there are a number of agencies that accept cyberattack reports from the general public and private sector. The FBI’s Internet Crime Complaint Center is the main general repository for general public reporting. The Secret Service is often the first agency to learn of large breaches at banks and companies. Once the Secret Service receives a complaint, it disseminates its information through the National Cybersecurity and Communications Integration Center (DHS), Information Sharing and Analysis Centers (DHS), Electronic Crime Task Forces (FBI) and additional agencies. Expect each of these functions to consolidate onto the campus. The potential impact of the Civilian Cyber Campus on the Washington DC metro area is significant. As Northern Virginia, Southern Maryland and the District of Columbia compete to become the home of the campus, the potential for an increase in leasing velocity on land adjacent to the campus could be extraordinary. As civilian agencies seek to partner with the private sector and the campus itself reaches capacity, expansion and overflow will become inevitable. CIVILIAN CYBER CAMPUS LONG TERM SPACE NEEDS UNKNOWN Similar to the St. Elizabeth’s Campus and FBI Headquarters consolidations, the mere idea of a future consolidation plan will affect GSA’s leasing policy upon lease expiration for future Civilian Cyber Campus occupants. Owners and investors should expect short term, “as- is” extension (5 years or less) requests, regardless of the status of the actual scheduled date of completion. On the other hand, all jurisdictions stand to experience vacancy as agencies consolidating onto the campus leave current locations. For example, NPPD, FBI and Secret Service are in leases spread across Northern Virginia and the District of Columbia – whether they maintain a presence off of the campus or not, the chance of reduction, if not 100% relocation is high. GETTING THE FACTS STRAIGHT: • The civilian cyber campus isexactly that: civilian. The DefenseDepartment will have littleinvolvement. • The campus is envisioned to befederally owned. • Four agencies are deeply involvedin the civilian cyber campus: National Protection and ProgramsDirectorate (NPPD) Federal Bureau of Investigation(FBI) The Office of Intelligence Analysis (IA) US Secret Service • The current expected price tag ofthe campus is $540 million. 14 15 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 13. he federal government has spent almost $32 billion on cybersecurity-related expenditures in the past 10 years. More importantly, the cyber spending boom shows no sign of slowing, as spending increased 281% from 2006 to 2014 (an average of 22% annually). This historic growth in cyber spending runs counter to the greater trend in federal government spending that has led to a relatively modest increase of 4.2% annually over the same time period. As the world becomes increasingly digitized, so has the federal government, but individual agencies are not spending on cybersecurity in similar ways. Each agency’s funding over the past 10 years tells a unique story - from the consistent upswing in spending of healthcare-focused agencies like HHS or VA, corresponding with new initiatives that have led these agencies to increasingly deliver sensitive information through online digital portals such as Healthcare. gov, to the recent explosion of cyber expenditures of a newly digitally focused Social Security Administration’s mission dictating cyber strategy. $31.6B FEDERAL AGENCY CYBER- SECURITY SPENDING SINCE 2006 T 16 17 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 14. oD’s critical role in the nation’s response to cyber terrorism makes it the heaviest cyber spender within the federal government. Accounting for almost half of the total spending of the last decade, the DoD cyber budget increased 295% from 2006 to 2014. Regionally, this spending has mostly occurred in Northern Virginia, which is not surprising given the amount of square footage the agency occupies in the region. 008’s Comprehensive National Cybersecurity Initiative (CNCI) solidified DHS’ role in protecting the homeland from cyberterrorism, which corresponds to a sharp increase in DHS cyber spending. Northern Virginia and the District of Columbia could see growth related to DHS spending since the agency already occupies significant square footage in both markets. Moreover, as demonstrated by the accompanying chart, DHS Cyber Security Specialists command salaries at the highest end of the federal pay scale and a hiring influx of high earners in the region could have a significant impact on the region’s economy. DEPARTMENT OF DEFENSE DEPARTMENT OF HOMELAND SECURITY D 2$16.0B $3.3B DEPARTMENT OF DEFENSE LEASED LOCATIONS IN NORTHERN VIRGINIA SPENT ON CYBERSECURITY SINCE 2006 SPENT ON CYBERSECURITY SINCE 2006 HOMELAND SECURITY AVERAGE SALARY BY POSITION DHS POSITION SALARY LOW MID HIGH Cyber Security Specialist $74,000 $110,000 $175,000 Medical Doctor $129,988 $152,792 $168,709 Nuclear Engineer $69,236 $82,918 $97,125 Intelligence Officer $70,064 $82,782 $96,285 US Air Marshall $44,000 $82,782 $96,285 Policy Analyst $87,000 $90,000 $93,000 Program Analyst $64,109 $76,515 $91,053 Mechanical Engineer $67,943 $77,057 $86,894 Coast Guard Officer $53,408 $68,000 $86,400 Security Specialist $51,841 $65,496 $82,295 IT Specialist $54,025 $65,727 $77,805 Chemist $49,797 $59,654 $72,326 Coast Guard Enlisted $37,604 $51,972 $66,340 Immigration Officer $34,000 $44,000 $54,800 Customs Specialist $31,000 $41,000 $50,000 Border Patrol Agent $39,000 $41,000 $46,000 Security Screener $34,049 $38,854 $44,304 Salary Source Data: indeed.com 18 19 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 15. HS’s cybersecurity spending has grown at a steady pace over the past decade as the healthcare market continues to mature. However, the growth of the agency’s real estate portfolio has remained flat. In its FY 2016 budget request, HHS proposes a budget of $73 million for its Cybersecurity Program, which represents a 44% increase over FY 2015 levels. This increase could be a catalyst for renewed HHS demand. Growth related to this spending should occur in Suburban Maryland –home for most of HHS’ leasehold interests, and Woodlawn, MD – home of the Centers for Medicaid and Medicare Services (CMS), and nationally as states engage in federal healthcare mandates. DEPARTMENT OF HEALTH HUMAN SERVICES H $2.4B HHS CYBERSECURITY PROGRAM DIRECT SPENDING oE will be responsible for securing some of the most critical energy infrastructure across the country and funding levels reflect that mandate. Whether or not the safeguarding of these vulnerable assets causes net new demand or growth is unclear. However, unlike some of the agencies with limited geographic concentrations (such as HHS, Commerce, and State) growth related to DoE should be national given the agency’s portfolio. Secondary and tertiary markets, especially, may benefit disproportionately. DEPARTMENT OF ENERGY D $1.8B AS OF 2013 THE US HAD THE FOLLOWING POWER PLANTS: SPENT ON CYBERSECURITY SINCE 2006 SPENT ON CYBERSECURITY SINCE 2006 20 21 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST| 1,101 Petroleum 518 Coal 1,476 Hydroelectric 63 Nuclear 1,725 Natural Gas 2,299 Other Renewable 44 Other Gases 78 Other Energy Sources
  • 16. hile 2014’s cyber budget increase may be an outlier, VA’s spending on cybersecurity still increased over 362% between 2006 and 2013. This consistent spending growth mirrors HHS’s spending habits as both agencies respond to growth in the healthcare industry. Similar to DoE, VA’s growth may occur nationally as regional VA Clinics and Veterans’ Benefit Offices increase hires to protect electronic medical records, files and Veterans’ personal information. DEPARTMENT OF VETERANS AFFAIRS W $1.1B NEW AND UNDER CONSTRUCTION VA LEASED FACILITIES APPROX LEASE SIZE SQUARE FOOTAGE 0 to 20,000 20,000 to 50,000 50,000 to 100,000 100,000 to 295,001 oS is one of the few agencies that has spent less on cybersecurity in recent years. Nevertheless, DoS continues to be one of the top 10 biggest federal cyber spenders--even without taking into account 2008, a year in which DoS’ cyber spending levels were beat only by DHS and DOD. Most of DoS’ growth will occur in the District of Columbia, Northern Virginia and abroad. DEPARTMENT OF STATE D $1.1B WASHINGTON, DC AREA DOS LEASED LOCATIONS SPENT ON CYBERSECURITY SINCE 2006 SPENT ON CYBERSECURITY SINCE 2006 22 23 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 17. ommerce will be working to coordinate federal response to cyber-threats related to retail and banking industries. Growth related to Commerce would be concentrated in the District of Columbia and Suburban Maryland, home of the National Institute of Standards and Technology (NIST). NIST was called upon in via Executive Order, to produce “The Cybersecurity Framework”. Created through public-private collaboration, the framework provides a voluntary and non-regulatory set of standards, guidelines and practices to help businesses address and manage cyber risk in a cost-effective way. Creation and maintenance of this network will be headquartered out of NIST’s Gaithersburg office and growth related to it is predicted to occur in that submarket. ainly driven by FBI spending, the Justice Department has spent almost a billion dollars on cybersecurity in the past decade. Expect this number to increase dramatically in the coming years, as FBI ramps up its leadership through the National Cyber Investigative Joint Task Force (NCIJTF). Much of the cyber related growth will occur outside of the already planned FBI Headquarters Consolidation. FBI related cyber-growth should take place primarily in Northern Virginia and nationally as FBI Field offices operationalize cyber protection mandates. DEPARTMENT OF JUSTICE M $0.8B FBI HEADQUARTERS CONSOLIDATION PROPOSED SITES FBI Plans to consolidate its headquarters into an approximately 1.2 million-square-foot headquarters in the Washington, DC region by 2021. $0.6B NIST ACTIVITIES TO MANAGE CYBERSECURITY RISK FUNCTION UNIQUE IDENTIFIER FUNCTION CATEGORY (CATEGORY UNIQUE IDENTIFIER) ID Identify Asset Management (AM) Business Environment (BE) Goverance (GV) Risk Assessment (RA) Risk Management (RM) PR Protect Access Control (AC) Asset Management (AT) Data Security (DS) Information Protection Process and Procedures (IP) Protective Technology (PT) DE Detect Anomalies and Events (AE) Security Continuous Monitoring (CM) Detection Processes (DP) RS Respond Communications (CO) Analysis (AN) Mitigation (MI) Improvements (IM) RC Recover Recovering Planning (RP) Improvements (IM) Communications (CO) DEPARTMENT OF COMMERCE C SPENT ON CYBERSECURITY SINCE 2006 SPENT ON CYBERSECURITY SINCE 2006 24 25 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 18. oT will be responsible for protecting critical national infrastructure from cyberattack as well as mobilizing the response for protection of air travel communication, including protecting the communication and traffic routing of the aviation industry through the Federal Aviation Administration (FAA). As stewards of some of the nation’s most critical infrastructure, DoT’s responsibilities and growth will occur both nationally and locally, within the DC Metro area as offices grow to respond to the challenge of defending the nation’s transportation channels. $0.5B D DEPARTMENT OF TRANSPORTATION hile SSA, barely cracks the top ten list of agency cyber spenders, recent changes to the agency’s digital mission has triggered a relative explosion in cyber related spending. The agency’s cyber spending increased a whopping 4,136% from 2006 to 2014. Growth related to SSA should be focused outside of Baltimore in the Woodlawn submarket (where SSA is headquartered) as well as nationally in local SSA offices. SOCIAL SECURITY ADMINISTRATION W $0.5B SPENT ON CYBERSECURITY SINCE 2006 SPENT ON CYBERSECURITY SINCE 2006 26 27 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 19. s this report goes to print, the frequency of cyberattacks only continues to increase. Within the past few months several major cyber events have made headlines across the country. Most notably, a hack into the Office of Personnel Management (OPM) exposed sensitive personal information of more than 22 million people. This number represents about 7 percent of the country’s population, which was around 320 million in 2014. The information breach included the highly sensitive Standard Form 86 documents, which contain information on family members and close friends. It is estimated that the federal government will have to spend up to $350 million in identity protection services to protect the sensitive information that was lost in the attack. Department of Homeland Security Secretary Jeh Johnson deemed the OPM breach a “wake-up call” and called for increased funding for cybersecurity spending. He was quickly followed by multiple members of Congress from both parties, who said they plan to investigate the OPM breach and the Government’s cybersecurity readiness on the whole. The Obama administration weighed in on the breach, as well, identifying the attack as work of the Chinese Government. With new attacks or attempted attacks surface everyday, cybersecurity is no ephemeral trend contingent on the fickle fluctuations of media focus or partisan politics. The cybersecurity movement is poised to be a transformational moment in our regional and national economies. As the Government continues to grow and refine the infrastructure of the federal response, demand for office space will grow, new people will move into the area and money will be spent across the Washington Metropolitan Area and around the country. As the specifics play out, the macro dynamics are already becoming evident. Based on the information available now, GIS is making the following predictions regarding the specific ways in which we believe cybersecurity will affect the federally- leased commercial real estate market. THERE WILL BE AN INCREASE IN GENERAL DEMAND Metro area will see an increase in cyber related office space demand as the number of cyber professionals in the area continues to grow. Cybersecurity professionals tend to make over 19.8% more than a standard IT professional, meaning the continued hiring of DC Metro cyber professionals will have many other positive effects on the local economy and CRE markets. THE GOVERNMENT’S INITIAL STRATEGY RELATED TO LEASING OFFICE SPACE RELATED TO CYBERSECURITY WILL BE COBBLED TOGETHER Growth will be piecemeal and occur at locations already occupied by a cyber related agency including branches of DHS, NPPD or FBI. The need to respond quickly will override the desire to consolidate and the arrival of the cybersecurity leasing portfolio will resemble the creation of DHS in the sense that it will be mostly reactive and occur in fits and starts. A BELLWETHER MOMENT OF CRITICAL INFRASTRUCTURE FAILURE WILL GALVANIZE THE GOVERNMENT INTO COMPREHENSIVE ACTION REGARDING CYBERSECURITY True growth in the federal cyber sector may arrive as the result of a major threat to the nation’s critical infrastructure. Heretofore, the average American citizen has perhaps been inconvenienced by a cyber hack but not threatened in a visceral way. An attack on the country’s critical infrastructure—a dam, a power plant—would make the threat real to the average citizen. Congress would see public opinion reflect support for an increase in funding the fight against cyber attacks. THE WORKFORCE RECRUITMENT AND RETENTION ACT OF 2014 WILL BE A TRANSFORMATIONAL PIECE OF LEGISLATION FOR THE WASHINGTON REGIONAL ECONOMY Similar to the migration of talent into the region during the Stimulus Boom of 2008 through 2010, if the Government prioritizes attracting top tech talent through offering compensation packages comparable to the private sector and, specifically Silicon Valley, every sector of the DC metro economy could be affected—from multi-housing to retail to, most notably, commercial office. FORECAST A DEFENSE RELATED GROWTH The area around Ft Meade has already benefited dramatically from defense related cyberspending. The Department of Defense, which has at least a decade’s head start on civilian government cyber buildup, has more than doubled the population of Fort Meade since 2005. Fort Meade, which was originally headquartered the National Security Agency (NSA), became the home of the US Cyber Command in 2010. In 2005, the base housed over 33,000 employees. Today, the base houses over 60,000—doubling the size of the Pentagon. As a result, the population of Anne Arundel County grew by at least 25% over the last two decades. Most of the physical growth at Ft, Meade, expansion, has occurred off the base in buildings adjacent to the base leased to DoD and NSA. INTELLIGENCE RELATED GROWTH Along Route 28, the Government has been building up intelligence related agencies for the past decade. With the major relocation of the Office of the Director of National Intelligence (ODNI) and easy access to historic intelligence assets in the area (NRO, CIA, etc;), Route 28 is an ideal receiver for back office intelligence related cyber space growth. Moreover, proximity to some of the most important tech firms in the world (Amazon, Google) makes collocation very attractive to federal agency’s seeking expertise from companies conversant in cyber-related matters. Continued interface with Silicon Valley will also increase Route 28’s popularity among federal Cyber tenants given the submarket’s proximity to Dulles International Airport. Federal and Private sector employees alike can conveniently commute back and forth between the two Cyber epicenters as needed. CIVILIAN CYBER GROWTH Located adjacent to both Marine Base Quantico and National Geospatial-Intelligence Agency (NGA), northern Stafford County will see a disproportionate amount of cyber related growth from civilian agencies driven primarily by FBI, in particular. The spending has already spurned dark fiber installation in the area, as well as fresh contractor relocations in surrounding office parks. While many of the planned 2,000+ new FBI cyber related agent and analyst hires will be spread out in regional offices across the country, many contractors will seek space around the Quantico due to its relationship with FBI. Moreover, the FBI growth related to cybersecurity will operate independently of the planned FBI Headquarters consolidation out of the Hoover Building in downtown Washington, DC. As the FBI HQ project continues in fits and starts, the agency’s cybersecurity mission must be agile and proactive - and, most importantly, must find ways to expeditiously deploy the funding provided by Congress. Leasing related to FBI cybersecurity will necessarily occur outside of the consolidation in order to preserve speed-to-market efficiency. Cyberattacks affecting American citizens will not wait while the FBI determines its housing plans. POCKETS OF GROWTH ALONG FEDERAL INFRASTRUCTURE The Government will slowly upgrade its cyber infrastructure across the country, creating spurts of spending growth on an agency by agency basis in primary and secondary CRE markets over the next decade. Additionally, look for new IT spending requirements in tertiary markets as agencies with geographically driven mission-related offices receive funding to upgrade their systems. For example: All FBI regional offices will receive funding to initiate cybercrimes task forces if they have not done so already. Veterans Affairs clinics will designate increased spending allocations for cybersecurity upgrades. Department of Energy offices located near critical energy infrastructure components (damns, renewable energy farms, etc) beef up their security protocols and safeguard measures. With each spending spurt, expect localized increases in federal real estate demand— creating small, decentralized space demand hotspots across the country over the next decade. FORTMEADEROUTE28STAFFORDCOUNTYNATIONAL DEMAND WILL OCCUR IN SELECT MARKETS WITH PRE-EXISTING INFRASTRUCTURE AND/OR ESTABLISHED FEDERAL DRIVERS WITH A RELATIONSHIP WITH CYBER RELATED TENANTS. CYBERGROWTHREGIONSCYBERGROWTHREGIONS 28 29 |BACKGROUND|GOVERNMENTOVERVIEW|AGENCYSPENDING|FORECAST|
  • 20. “It’s no surprise that cybersecurity will be architected out of the same market where the Internet was created...Northern Virginia” HERB MANSINNE Managing Director, Brokerage “In the span of a decade, the government has expended over $30 billion and has hired thousands of employees dedicated to cyber, with consistent growth predicted in the years to come. However, it may take a “Pearl Harbor” cyber event to initiate the type of growth that has an immediate “needle moving” impact on the real estate world.” JOE BRENNAN Managing Director, Government Investor Services “Demand from cyber-related firms seeking space in the Metro area has significantly increased over the past 12 months. Many of the Silicon Valley-based firms are seeking outposts in the Metro area in order to work on federal contracts related to cybersecurity initiatives. Firms are specifically focused on the Toll Road market given the proximity to Dulles, target employee demographics and visible signage opportunities” JAY FARMER Managing Director, Brokerage “The increase in cybersecurity spending and employment has fueled record-setting multifamily absorption in Washington, DC. More than 14,000 apartment units were newly occupied in the 12 months ending June 2015 - an all-time record and almost double the annual average.” CHRIS ESPENSHADE Managing Director, Capital Markets “The typical cybersecurity focused tenant uses less space per person. This is driven by the utilization of benching due to the necessity of maintaining an open office environment. However, the lower physical build-out costs are often offset by increased infrastructure and connectivity, i.e., soft requirements.” CHRIS MOLIVADAS Managing Director, Project Development Services “In Prince William, Loudoun and Fairfax Counties enterprise data centers have leased or purchased over 2.0M SF of conventional warehouse space, representing nearly 10% of the industrial inventory in those markets. The 2.0M SF are done deals. This 2.0M SF does not include the data centers being built by DuPont Fabros, Equinix, Digital Realty Trust, Sabee and more. “ JOHN DETTLEFF SVP, Brokerage PERSPECTIVES ON THE BROADER CYBER IMPACT FROM THE JLL INVESTOR SUITE AGENCYLEASING FEDERALCRE CYBERIMPACTONTHECAPITALMARKETS TENANTREPRESENTATION MULTIFAMILY DEVELOPMENT INDUSTRIAL he Capital Markets have responded favorably to the riseof cybersecurity as a nationaldefense priority due to theopportunity to create andretain value. The investing and lending communities have demonstrated that they are beginning to place a premium on assets withcybersecurity-related tenants. The reason behind this increase in confidence is the certainty of renewal created by the specialized nature of the properties and clear growth trajectory in the sector. Federal cybersecurity spending has increased 56.6% since 2011 despite an 11.6%decline in federal contract spending during thesame period. No other defense initiative hasclearer spending priority in the federal, state and local budgets. On top of the initial tenant improvement allowance, cyber-related tenants create highly-specializedfacilities through additional capital investment inconnectivity to specific fiber lines, SCIF build-outs and other infrastructure enhancements. Thesignificant capital expended through the firstseveral years of the lease indicates a long-termcommitment to the space due to the inability to endure the downtime and significant investment associated with a relocation. As a result, cyber-related leasing has received less scrutiny thanstandard federal leasing, for example, in one recent lease, the GSA self-funded over $200 per squarefoot in tenant improvements. Sophisticated buyers have begun to understandthat cyber-related tenants with shorter firm terms may actually have higher renewal potentials thanother federal users in traditional office spaceunder longer term leases. Buyers are placing anincreased emphasis on the specialized nature ofcyber-related installations and are underwritinghigher renewal probabilities and capturing theadditional resulting value. As a result, cap ratesare being driven by a combination of the remaining term and the specific agency and mission. The bottom line: assets with cybersecurityrelated tenants are not commodity office space– the specialized nature of these facilities isan indication of tenant commitment to thestrategically located properties – all coalescingin a strong story and “hook” that increases buyer interest, and ultimately asset value. T 30 31 MARC RAMPULLAEVP, Capital MarketsGovernmentSolutions BRIAN SAAL VP, Capital Markets GovernmentSolutions
  • 21. This glossary1 is a collection of commonly-used cyber-related terms. It is meant as a primer for understanding basic industry terminology. For the purposes of this list, terms have been divided into either Offensive or Defensive connotations—although many of the terms can apply to both characterizations. We are providing this glossary to enable you to navigate this report as we explore the complicated, often esoteric, world of cybersecurity. 1 Terms and definitions adapted from the National Initiative for Cybersecurity Careers and Studies. CYBER GLOSSARY ANTISPYWARE SOFTWARE – A program that specializes in detecting and blocking or removing forms of spyware. CLOUD COMPUTING – An on-demand network of “shared pool” computing resources. COMPUTER NETWORK DEFENSE – The actions taken to defend against unauthorized activity within computer networks. CRITICAL INFRASTRUCTURE – The systems and assets, whether physical or virtual, so vital to society that the incapacity or destruction of such may have a debilitating impact on the security, economy, public health or safety, environment, or any combination of these matters CYBERSECURITY – Protecting computers, mobile devices, tablets, networks, programs and data from unauthorized access or manipulation. CYBERSPACE – The interdependent network of information technology infrastructures. Cyberspace includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers. DARK FIBER NETWORK – A privately operated network of optical fiber cabling that is used for secure and direct communication and data exchange between facilities DIGITAL FORENSICS – Gathering, retaining and analyzing system-related data (digital evidence) for investigative purposes. FIREWALL – A capability to limit network traffic between information systems. NETWORK RESILIENCE – The ability of a network to: 1. Provide continuous operation. 2. Recover effectively if failure does occur. 3. Scale to meet rapid or unpredictable demands. REDUNDANCY – Additional systems, assets or processes that maintain a degree of overall functionality in case of loss or failure of another system. SCIF – Sensitive Compartmented Information Facility - an enclosed area within a building that is used to process classified information. DEFENSIVECYBER ATTACK (CYBERATTACK) – An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. There are 5 main attack types: 1. PHISHING – An attack designed to deceive individuals into providing sensitive information. 2. MALWARE – Software that compromises the operation of a system by performing an unauthorized function or process. 3. TROJAN HORSE – A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms. 4. SPOOFING – Faking the sending address of a transmission to gain unauthorized entry into a secure system. 5. DENIAL OF SERVICE – An attack that prevents or impairs the authorized use of resources or services. BOT – A computer connected to the Internet that has been compromised with malicious intent to perform activities under remote control. BOTNET – A collection of computers compromised by malicious code and controlled across a network. CYBERTHREAT – The possibility of a malicious attempt to damage or disrupt a computer network or system. DATA BREACH – The unauthorized movement or disclosure of sensitive information to a party that is not authorized to have or see the information. DATA MINING – The process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations. HACKER – An unauthorized user who attempts to or gains access to an information system. KEYLOGGER – Software or hardware that tracks keystrokes, usually secretly, designed to be monitored by an alternate user. SPAM – The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. SPYWARE – Software that is secretly installed into an information system without the knowledge of the system user or owner. THEFT – The primary goal of hackers, cyber-related theft typically is either: 1. IDENTITY THEFT 2. INTELLECTUAL PROPERTY THEFT (i.e. patents, trademarks, trade secrets and copyrights) VIRUS – A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer. ZERO-DAY ATTACKS – An attack that exploits a previously unknown vulnerability in a computer application or operating system, one that developers have not had time to address and patch. OFFENSIVECYBER 32 33
  • 22.
  • 23. JLL (NYSE: JLL) is a professional services and investment management firm offering specialized real estate services to clients seeking increased value by owning, occupying and investing in real estate. A Fortune 500 company with annual fee revenue of $4.7 billion and gross revenue of $5.4 billion, JLL has more than 230 corporate offices, operates in 80 countries and has a global workforce of approximately 58,000. On behalf of its clients, the firm provides management and real estate outsourcing services for a property portfolio of 3.4 billion square feet, or 316 million square meters, and completed $118 billion in sales, acquisitions and finance transactions in 2014. Its investment management business, LaSalle Investment Management, has $56.0 billion of real estate assets under management. JLL is the brand name, and a registered trademark, of Jones Lang LaSalle Incorporated. For further information, visit www.jll.com. The Government Investor Services team at Jones Lang LaSalle is the premier provider for comprehensive federal real estate advisory services. Combining deep market experience and political tradecraft with superior research and financial analysis, we create certainty for our clients—driving value and confidence in an increasingly complex federal marketplace. Contact information ©2015 Jones Lang LaSalle IP, Inc. All rights reserved. No part of this publication may be reproduced by any means, whether graphically, electronically, mechanically or otherwise howsoever, including without limitation photocopying and recording on magnetic tape, or included in any information store and/or retrieval system without prior written permission of Jones Lang LaSalle. The information contained in this document has been compiled from sources believed to be reliable. Jones Lang LaSalle or any of their affiliates accept no liability or responsibility for the accuracy or completeness of the information contained herein and no reliance should be placed on the information contained in this document. Joseph Brennan Managing Director +1 202 719 5606 joseph.brennan@am.jll.com Brian Saal Vice President +1 202 719 5831 brian.saal@am.jll.com 1801 K Street NW Suite 1000 Washington, DC 20006 +1 202 719 5000 jll.com/dc Brian Sullivan Managing Director +1 202 255 7138 brian.sullivan@am.jll.com Jeff Hurvitz Associate +1 202 719 5670 jeff.hurvitz@am.jll.com Art Turowski Senior Vice President +1 202 719 6176 arthur.turowski@am.jll.com Colleen Hollowood Brokerage Assistant +1 202 719 5877 colleen.hollowood@am.jll.com Lucy Kitchin Senior Vice President +1 202 719 5752 lucy.kitchin@am.jll.com Sarina Singh Associate +1 202 719 5739 sarina.singh@am.jll.com About JLL About JLL Government Investor Services