Title of Presentation

Download Report

Transcript Title of Presentation

Federal Information Security Spending
Outlook
Kevin Plexico
Senior Vice President, Research and Analysis Services
INPUT
July 17, 2015
Copyright © 2010 by INPUT. All rights reserved.
Agenda
Federal Information Security Market Drivers
Major Initiatives
Information Security Forecast
Conclusions and Recommendations
Copyright © 2010 by INPUT. All rights reserved.
2
Federal Information
Security Market Drivers
Copyright © 2010 by INPUT. All rights reserved.
3
Threat Complexity and Impact Driving Offensive
Strategy Development
Unpopular wars have
tarnished US standing
and created global
enemies
Enemies are becoming
more creative, more
tech savvy, and better
financed
Better tools have
uncovered security risks
and vulnerabilities
Threats diverse and expanding
Foreign government
sanctioned and/or
financed
Politically/militarily/econo
mically motivated
Domestic and
International
Potential economic
ramifications of disruption
requires more aggressive
solutions.
Roles of U.S.
intelligence, military and
civilian shifting to
include offensive
positioning
Copyright © 2010 by INPUT. All rights reserved.
Organizations as well as
individual actors
Shift from “nuisance”
attacks to intent to
damage
Goal: disruption,
destruction and theft
“Collateral
damage:”Information
disruption caused by
physical disruption
4
Increasing Activity Requires More Diligent
Actions
2009 Federal Security Incidents and Events
Number of Incidents and Events
0
20000
40000
8779
Virus/Trojan/Work/Logic Bomb
Non Cyber
6847
Policy Violation
6063
Equipment Theft/Loss
4779
Malicious Web Site
4512
3569
Attempted Access
1120
Social Engineering
479
Others
80000
70132
Phising
Suspicious Network Activity
60000
The number of incidents
has increased 400%
since 2006.
2430
Source: U.S. CERT
Copyright © 2010 by INPUT. All rights reserved.
5
Bipartisan Support for More Action &
Investment
Protecting Cyberspace as a National Asset Act of 2010
Federal Information Security Amendments Act of 2010
Legislation
Concerted Effort to
Increase Cyber
Workforce and
Training
Centralized
security
certification
program for
cloud computing
vendors
Recruiting
Cyber Czar
Cyber
Security
Measures
Howard Schmidt
White House
Cybersecurity
Coordinator
OMB
Directive
FedRAMP
Cyberscope
Clarifies roles
of DHS, OMB,
WH Cyber
Coordinator
Online security dashboard for FISMA reporting
Copyright © 2010 by INPUT. All rights reserved.
6
Evolving Threats = Broad Technology Needs
for Global Defense
Federal Cybersecurity Priorities
Identity
Mgmt.
Intrusion
Detection
Private Sector Education
Limited Internet Access Points
Situational
Awareness
Real-time
Monitoring
Vulnerability
Scanning
Application
Security
Copyright © 2010 by INPUT. All rights reserved.
Education
and
Training
7
Major Information Security
Initiatives
Copyright © 2010 by INPUT. All rights reserved.
8
DoD’s U.S. Cyber Command (CYBERCOM) Takes the
Defense Cyber Helm
FORMATION
Launched – 6/2009 as a sub-unit under USSTRATCOM
Led by General Keith B. Alexander
Initial operation by 10/2009 and full operation by 10/2010
Oversee the protection of military networks against foreign and domestic cyber
threats and to develop a range of offensive cyber warfare capabilities
SCOPE
MISSION
Charged with defending the .mil domain
NSA to continue to offer assistance in defending the .gov and .com domains
Homeland Security Department to maintain responsibility for .gov networks.
Assumes existing USSTRATCOM orgs:
The Joint Task Force for Global Network Operations
IMPLICATIONS
Joint Functional Component Command for Network Warfare
Forces collaboration among the military components’ cyber operations
Appears to be centralized around an Integrated Cyber Center
Will rely on DISA for support
Copyright © 2010 by INPUT. All rights reserved.
9
Civilian Initiatives Span Several Agencies
Comprehensive
National
Cybersecurity
Initiative (CNCI)
GSA’s
MTIPS
•Established by President Bush in 1/2008
•Goal of improving efforts to protect against
intrusion attempts and anticipate future threats
across federal computer networks
•Estimated budget of $40b over several years
Established March 2009
Allows agencies to obtain TICcompliant Internet services
through Networx
OMB’s
Information
Systems Security
Line of Business
(ISS LoB)
Department of
Homeland
Security
Initiatives
•Established as part of President Bush’s eGov
Initiative
•Goal of improving the level of information
systems security across the federal government,
and to gain cost efficiencies by sharing functions
and processes for managing information security
OMB’s
FDCC
•Federal Desktop Core
Configuration (FDCC)
•Established by OMB in 2007
Collaboration with DHS NSC
Division/US-CERT and NIST
•National Cyber Security Center (NCSC)
•U.S. Computer Emergency Readiness Team (USCERT)
•EINSTEIN
•Trusted Internet Connections (TIC)
•Cyber Storm
•Cyber Security R&D Center
GSA’s
SmartBUY
Copyright © 2010 by INPUT. All rights reserved.
GSA’s program for improving,
streamlining and automating IT
systems for lender processing
systems
10
Federal Information
Security Industry Forecast
Copyright © 2010 by INPUT. All rights reserved.
11
Federal Addressable IT Security Forecast
2009 – 2014
Source: OMB, INPUT
Copyright © 2010 by INPUT. All rights reserved.
12
Intel and Defense Outpacing Civilian in IT Security
Growth
Source: OMB, INPUT
Copyright © 2010 by INPUT. All rights reserved.
13
IT Security Market Segment
Forecast 2009-2014
Copyright © 2010 by INPUT. All rights reserved.
14
Rapidly Changing Technology
Niche markets emerging for specialized product and
service companies – some examples
• SCAP tools
• Product certification support
• End user awareness training
• Situational awareness monitoring tools
Markets emerge out of
• Mandates/legislation – FISMA compliance, SCAP,
certification requirements
• Need for Command & Control – real time monitoring
• Opportunities resulting from implementation of 60 Day
Cyber Review
Copyright © 2010 by INPUT. All rights reserved.
15
Conclusions &
Recommendations
Copyright © 2010 by INPUT. All rights reserved.
16
Conclusions
Mandates, legislation & funding driving double-digit growth
• Problem still growing; bipartisan recognition of challenges
Growth inhibited by complexity of problem and leadership
uncertainty
Consolidation will shift budgets and authority
Focus on private/public collaboration
• Will likely lead to more regulation of commercial activities
Technology evolving very quickly
• Tools/Automation offsetting professional services
• ‘Mini-markets’ emerging with changes in tech and mandates
Expect White House to drive Cyber Security
Copyright © 2010 by INPUT. All rights reserved.
17
Recommendations
Follow consolidation for shifting funds
Look for cyber security hotspots for bigger opportunities
Focus on low-hanging fruit in new leadership’s security
reform targets
Agencies with lowest FISMA scores
Leverage relationships to position for new Opportunities in:
New compliance requirements
Implementation of ‘Command & Control’ capabilities
Awareness training
Support for independent audits
Source: House Oversight and Government Reform Committee Federal Computer Security Report Card
Copyright © 2010 by INPUT. All rights reserved.
18
Q&A
Copyright © 2010 by INPUT. All rights reserved.
19