Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Stretching Government IT Budgets

Government budgets are not infinite, but with some work, they can be made a bit more elastic.

Stretching a budget however means finding efficiencies that will allow agencies to cut costs, and that, means understanding what your organization needs to protect and prioritizing, according to attendees at the (ISC)2 Security Congress in Philadelphia.

Government budgets are not infinite, but with some work, they can be made a bit more elastic.

Stretching a budget however means finding efficiencies that will allow agencies to cut costs, and that, means understanding what your organization needs to protect and prioritizing, according to attendees at the (ISC)2 Security Congress in Philadelphia.

“You can’t protect everything anymore,” said Matthew McCormack, who formerly served as chief information security officer for the Defense Intelligence Agency (DIA) and director of cyber-security operations for the Internal Revenue Service (IRS).

At the IRS, he said, his job was to keep the bad guys out; at the DIA, he was also tasked with catching insiders who misused data they were authorized to access. The shift in focus meant making decisions about what data was most critical and how he would go about protecting it, he said.

“Believe it or not, thin clients are cool again,” he said, adding that the devices are generally cheaper and make it easier to protect the perimeter.

Automation of routine tasks is also key, noted Peter Gouldmann, U.S. State Department liaison to the National Institute of Standards and Technology (NIST). Gouldmann and McCormack were part of panel Tuesday that discussed ways government agencies can make the most of their budgets, including repurposing hardware and applying data collected through monitoring in multiple ways.  

“How many of these things can I check off by doing the same operational monitoring that I’m doing today…if you can leverage your workforce gain a lot of intelligence out of your current monitoring capability and apply them to the business control requirements, you have saved yourself [money],” Gouldmann said.

Once employees are freed up, they too can be repurposed in ways that save money, Hord Tipton, executive director of ISC2, said Wednesday.

Advertisement. Scroll to continue reading.

“Anytime you can repurpose people…they go into some other area, some other cost center,” he said.

Another key area that provides cost savings is cloud computing, which Tipton said government agencies are cautiously embracing due to concerns about the safety of critical data.

“The cloud can start small; they’ll need to start probably with an internal private cloud just to see how it works,” he said.

Brent Conran, who was also on the panel Tuesday, described how moving to the cloud could reduce power consumption and cut costs. Prior to assuming his role as CSO at McAfee, Conran served as both the CIO and CISO of the U.S. House of Representatives, where he oversaw an effort to build a private cloud and consolidate servers.  

Some of the advice however was non-technical, such as learning to play nice with the chief financial officer and human resources. The two hardest things to come by, McCormack said, are people and money – and HR and the CFO can help with both.

“I always try to spend a lot of time with the CFO, because if you are friends with the CFO or your budget analyst, when they have money, guess who they are going to call? They’re going to call you because they know you can execute and spend that money in a week,” he said.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...