Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

DHS CISO Offers a Real-Time View of CDM

by GTI Editors
February 5, 2016
in Cybersecurity
Reading Time: 4 mins read
A A
Share on FacebookShare on Twitter

jeffGetting to real-time visibility on network performance, challenges and threats is a central part of Jeff Eisensmith’s job.

Eisensmith, the CISO at the Department of Homeland Security (DHS), is responsible for department-wide cyber security. This is a daunting prospect – created in the aftermath of 9/11, DHS incorporated into one organization more than 20 different agencies, services, offices, and programs that had been scattered among nine other departments. That means multitudes of legacy systems, disparate organizational cultures, and missions that had to be integrated.

Despite that, Eisensmith doesn’t see DHS’ security challenges as a distinction.

“DHS is not unique in terms of size or complexity,” he told FTI in a telephone interview. “We share the same challenges as IT providers in general,” establishing visibility at the perimeter of networks and visibility between business units.

DHS’ award of the Continuous Diagnostics and Mitigation (CDM) blanket purchase agreement in 2013, open to all federal, state and local governments and broken into three separate capability phases, was a major step forward in knitting together the cyber security of the sprawling department.

“DHS has always done CDM, always had that capability, using tools associated with its different components,” he said. “This was a once in a lifetime opportunity to paint DHS with one brush … Done correctly, cyber security is an incredible enabler of mission.”

Eisensmith wholeheartedly supports the CDM BPA. “All those products are vetted beforehand, negotiated at really great rates,” he said. “All I have to do when I need a new tool is pick off that list. I save countless personnel time [from] doing procurements, [and] implementation and support also are available.”

The immediate big challenge for DHS is to provide visibility in real time all the way down to individual desktops.

“Often the challenges associated with visibility in real time are associated with throughput,” he said. “DHS is really diverse, with a lot of legacy [systems]. Getting that real time visibility down to the desktop is all about the efficiency of security tools.”

He cited Customs and Border Protection (CBP) and the Coast Guard, two of DHS’ agencies, as examples of one particular challenge.

“[They] can have really small pipes. We have to have network tools that are intelligent about how to use limited bandwidth,” he said. It takes “investment in connectivity, tools that are smarter about … getting to that last mile.”

To maximize its funding, “our budget priorities are tied to having mapped out our defense-in-depth capabilities and gaps, tying them to known threats, and making investments where they’re most needed,” he said.

According to John Sellers, Vice President for Federal at Lancope, a Cisco company, that offers real-time threat intelligence, the focus on visibility is critical for agencies. “The Cisco StealthWatch system helps security operations staff gain real-time situational awareness of all users, devices, and traffic on a network down to the individual endpoint,” Sellers told us.  “By relying on NetFlow, a context-rich and common source of network traffic metadata, StealthWatch can leverage the existing networking infrastructure to give the security operations center (SOC) complete visibility into every transaction of every host on the network. It then can baseline what normal behavior looks like for each host and detect and alert on suspicious or anomalous behavior, so that the SOC can respond before an event becomes a major crisis.”

 Achieving real time visibility to the desktop doesn’t mean the security challenge is solved for the DHS.

“Regardless of whether you’re in DHS or elsewhere, … the adversary is able to modify their attacks. They’re not weighted down by scruples, laws, any oversight whatsoever, [where] if I make a change, am I going to break a 350,000-user network?” Eisensmith said. “The way we’re getting in front of that incredible challenge – it’s not new or innovative – is a defense in depth strategy that includes defense of products … If you’re running a product and you know it fairly well and it starts doing something you’ve never seen before, you don’t know what it is, it doesn’t smell right,” it can be containerized and a lot of tools can be applied.

Just as important as having the right tools is having leadership committed to solving the problem, he said.

“I was in the room, I was very privileged, when [DHS Secretary] Jeh Johnson brought all the component heads and their CIOs together,” Eisensmith said. “He said, ‘We are going to get cyber security right. That CIO next to you? He speaks for me.’ That kind of leadership top cover? It gave me goosebumps.”

Tags: CDMCDM BPAcontinuous diagnostics and mitigationcyber securityDHSDHS CISOJeff Eisensmith

RELATED POSTS

Contributed Articles

CMMC 2.0 –The Ever-Evolving Cybersecurity Rules all Oklahoma DoD Contractors Need to Know

December 15, 2021
cybersecurity skills gap
Cybersecurity

Digital and Cybersecurity Skills Gap Puts Federal Agencies at High Risk for Attacks

December 14, 2021
federal cybersecurity
Cyber Security

Prioritizing A Strong Federal Cybersecurity Team Exemplifies Agency Maturity

November 1, 2021
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5369 shares
    Share 2148 Tweet 1342
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    41 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us