Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Does Improving Federal Cybersecurity Begin with Improving the Acquisitions Process?

by Peter Jacobs
December 11, 2018
in Cybersecurity
Reading Time: 4 mins read
A A
acquit ions
Share on FacebookShare on Twitter

The ability to secure federal data, networks, and assets is impacted by the ability of agency cyber leaders to access required technology. They need to continually respond to well-resourced adversaries that are constantly evolving the mechanisms of attack. Because of the acquisitions process, requests to upgrade existing cyber defenses or acquire the tools that can keep pace with this constantly evolving threat environment can take months if not years. During that time – from request to approval and deployment – critical systems and data are vulnerable to a breach.

But is the acquisition process, or at least how agencies approach it, responsible for on-going cyber vulnerabilities among federal agencies?

While this is a commonly heard argument around Washington, D.C., Kimberly Baker, Senior Vice President and GM Public Sector for RedSeal, believes that the acquisition process isn’t the obstacle to quickly bringing in new cybersecurity technology. “We don’t need any process or procedure changes,” she said. “Everything agencies need to operate quickly exists in the current acquisition policy and Federal Acquisition Regulation (FAR).”

View More Cybersecurity Resources

While current regulations and processes can support speedy acquisitions, what does cause concern among agency IT leaders and procurement teams is the uncertainty in funding. The recent history of budgets that aren’t approved at the beginning of the cycle causes agencies to rely on continuing resolutions (CRs) to keep the federal government running. The result is that “an agency needs to complete an annual acquisition cycle in a single quarter,” shared Baker.

To help offset these pressures, Baker noted that agencies are looking for alternatives to traditional technology purchasing — paying large sums upfront for new hardware and software. “There’s been a shift from perpetual software licensing, for example, to shorter terms and as-a-service procurements. These are classified as operating expenses rather than as capital investments.”

She explained that this shifts the risk to suppliers and encourages everyone to make sure value is truly being delivered. The hard part, though, is anticipating out-year costs. “When you go to a subscription or as-a-service model, you may need more capacity than you expected. Your real capacity need is 5X, but you only planned for 2X,” she noted. “So, there are a different set of things you need to plan for and build into your contract when you’re putting an as-a-service or subscription program in place.”

And there’s still one more option for investing in state-of-the-art cyber tools that will help stem the tide of attacks, Baker pointed out – the Technology Modernization Fund (TMF). “The TMF is a great resource for funding pilot programs that can be iterated and repeated multiple times across multiple agencies in short order.” However, Baker went on to note that it’s rare that you get to build something new from the ground up without addressing legacy technology, particularly when it comes to ensuring the safety and integrity of data and infrastructure. “TMF lets us focus on not just having a cool, whiz-bang plan for a new capability and technology, but also on how we can eliminate and shut down legacy systems in an orderly way.”

The challenge is that there is never enough money to fully modernize at an enterprise level. But, as Baker explained, “if the program office is smart about what they choose to invest in, they’ll identify projects with a strong ROI based on a solid business case, scoped to be completed within the agency’s fiscal year.”

Baker said that as agencies move through the phases of the Department of Homeland Security’s CDM program and need to upgrade infrastructure and integrate additional vulnerability management and incident response tools, for instance, agency cybersecurity leadership will want to work closely with their acquisition and contracting counterparts. “This combination of well-educated, forward thinking acquisition and contracting leadership who are engaged with the major IT spending organizations – CIO or program level – will be able to execute quickly and deliver results no matter what obstacles – real or perceived – might be in the way,” she concluded.

Tags: cybersecurityCybersecurity ProcurementFederal CybersecurityKimberly BakerOTAsOther Transactional AuthoritiesProcuring Cybersecurity ToolsRedSealRedSeal FederalSecure DataTechnology Modernization Fund

RELATED POSTS

With a Funding Bonus, Department of Defense Has a Unique Opportunity to Invest in Digital Transformation
Defense & IC

With a Funding Bonus, Department of Defense Has a Unique Opportunity to Invest in Digital Transformation

June 29, 2022
Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5370 shares
    Share 2148 Tweet 1343
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    41 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us