DEFINING CYBERSECURITY FEDERAL AGENCY CYBERSECURITY FUNDING

Size: px
Start display at page:

Download "DEFINING CYBERSECURITY FEDERAL AGENCY CYBERSECURITY FUNDING"

Transcription

1 DEFINING CYBERSECURITY FEDERAL AGENCY CYBERSECURITY FUNDING

2 The Federal Government has spent almost $32 billion on cybersecurity-related expenditures in the past 10 years. More importantly, the cyber spending boom shows no sign of slowing, as spending increased 281% from to (an average of 22% annually). This historic growth in cyber spending runs counter to the greater trend in Federal Government spending that has led to a relatively modest increase of 4.2% annually over the same time period. As the world becomes increasingly digitized, so has the Federal Government, but individual agencies are not spending on cybersecurity in similar ways. Each agency's funding over the past 10 years tells a unique story - from the consistent upswing in spending of healthcare-focused agencies like HHS or VA, corresponding with new initiatives that have led these agencies to increasingly deliver sensitive information through online digital portals such as Healthcare.gov, to the recent explosion of cyber expenditures of a newly digitally focused Social Security Administration s mission dictating cyber strategy. $31.6B $6.0 $5.0 $4.0 $3.0 $2.0 $1.0 TOTAL FEDERAL FUNDING SINCE

3 Accounting for almost half of the total federal cyber spending in the last decade, the DoD cyber budget increased 295% from to. This spending heavily favoars Northern Virginia, which is not surprising given DoD's significant leasehold in the region. $16.0B DEPARTMENT OF DEFENSE FUNDING SINCE $3.0 $2.5 $2.0 $1.5 $1.0 $0.5

4 's Comprehensive National Cybersecurity Initiative (CNCI) solidified DHS' role in protecting the homeland from cyberterrorism. CNCI represented the first coordinated initiative from the Federal Government to protect internal computer systems comprehensively rather than on an agency-by-agency basis. DHS cyber spending will continue to be focused in NoVA and DC, where the agency has established a major footprint. $3.3B DEPARTMENT OF HOMELAND SECURITY FUNDING SINCE $0.6 $0.5 $0.4 $0.3 $0.2 $0.1

5 HHS's cybersecurity spending has grown at a steady pace over the past decade as the healthcare market continues to mature. This constant growth is expected to continue for the next couple of years as the healthcare industry expands. Growth related to this spending should occur in Southern Maryland (home to most of HHS' leasehold interests) and nationally as states engage in federal healthcare. $2.4B DEPARTMENT OF HEALTH AND HUMAN SERVICES FUNDING SINCE $0.50 $0.45 $0.40 $0.35 $0.30 $0.25 $0.20 $0.15 5

6 DoE will be responsible for securing critical energy infrastructure across the country and funding levels reflect that mandate. Growth related to DoE cyber spending should be expected on a national basis given distribution of critical assets. $1.8B DEPARTMENT OF ENERGY FUNDING SINCE $0.30 $0.25 $0.20 $0.15 5

7 While may be an outlier, VA's spending on cyber security still increased over 362% between and. This consistent spending growth mirrors HHS's spending habits as both agencies respond to growth in the healthcare industry. $1.1B DEPARTMENT OF VETERANS AFFAIRS FUNDING SINCE $0.35 $0.30 $0.25 $0.20 $0.15 5

8 Despite an overall decrease in spending, DoS is one of the few agencies that has spent less on cybersecurity in recent years. Nevertheless, DoS continues to be one of the top ten biggest federal cyber spenders-even without taking into account, a year in which DoS' cyber spending levels were beat only by DHS and DoD. Most of DoS' growth will occur in the District of Columbia, Northern Virginia and abroad. $1.1B $0.35 $0.30 DEPARTMENT OF STATE FUNDING SINCE $0.25 $0.20 $0.15 5

9 Mainly driven by FBI spending, DoJ has spent almost a billion dollars on cybersecurity in the past decade. Expect this number to increase dramatically in the coming years as the FBI ramps up the National Cyber Investigative Joint Task Force (NCIJTF). Growth related to FBI (aside from an eventual HQ consolidation in the DC Metro area) should take place nationally as FBI field offices carry out cyber protection mandates. $0.8B $0.16 $0.14 DEPARTMENT OF JUSTICE FUNDING SINCE $ $

10 Commerce will be working to protect its cyber assets and shore up vulnerabilities in its system in regards to large data stores of information on the retail and banking industries. Growth related to Commerce would be concentrated mostly in the District of Columbia, but could still have an impact nationally. $0.6B DEPARTMENT OF COMMERCE FUNDING SINCE $0.14 $

11 DoT will be responsible for protecting critical infrastructure from cyberattacks as well as mobilizing the response for protection of air travel communication. Growth related to DoT would be concentrated in the District of Columbia for headquarters functions and nationally in close proximity to major infrastructure. $0.5B DEPARTMENT OF TRANSPORTATION FUNDING SINCE

12 While SSA barely cracks the top ten list of agency cyber spenders, recent changes to the agency's digital mission have triggered an explosion in cyber related spending. The agency's cyber spending increased a whopping 4,136% from to. The nature of SSA's national footprint should facilitate cyber growth related to the agency's mission across the nation. $0.5B SOCIAL SECURITY ADMINISTRATION FUNDING SINCE $0.18 $0.16 $0.14 $

13 FOR MORE CYBERSECURITY RESOURCES FOR GOVERNMENT REAL ESTATE INVESTORS, VISIT JLL.COM/CYBERSECURITY

Embargoed until Thursday, June 30, 2005, 7:00 AM

Embargoed until Thursday, June 30, 2005, 7:00 AM Embargoed until Thursday, June 30, 2005, 7:00 AM Federal Procurement Spending In The Washington Area Increases by $7.8 Billion in 2004, Up 18.4 Percent, To A Total of $50.0 Billion By Stephen S. Fuller,

More information

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION GROWTH CATALYSTS & LEGISLATION The current policy funding and policy landscape surrounding cybersecurity initiatives and funding is convoluted with

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA

The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA The DS Information Assurance and Cybersecurity Role-Based Training Program Diplomatic Security Training Center (DSTC) Dunn Loring, VA IAB Mission The Information Assurance Branch s (IAB s) mission is to

More information

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland

More information

22. HOMELAND SECURITY FUNDING ANALYSIS

22. HOMELAND SECURITY FUNDING ANALYSIS 22. HOMELAND SECURITY FUNDING ANALYSIS Section 889 of the Homeland Security Act of 2002 requires that a homeland security funding analysis be incorporated in the President s Budget. This analysis addresses

More information

PointofView. You Need to be Known to be Liked: Applying Lessons from Corporate Reputation Management to the Public Sector

PointofView. You Need to be Known to be Liked: Applying Lessons from Corporate Reputation Management to the Public Sector PointofView You Need to be Known to be Liked: Applying Lessons from Corporate Reputation Management to the Public Sector Public Perceptions of the Reputation of the Federal Government and Other Public

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Comparing Chinese Investment into North America and Europe

Comparing Chinese Investment into North America and Europe Comparing Chinese Investment into North America and Europe 1 EXECUTIVE SUMMARY Chinese outbound foreign direct investment (OFDI) has grown rapidly in recent years and is increasingly flowing to high-income

More information

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation Briefing Outline Overview of the CUI Program Establishment of the Program Elements of the CUI Executive Order Categories and Registry Handling CUI Current Efforts Implementation Plan CUI and IT Implementation

More information

SMALL BUSINESS RESEARCH PROGRAMS. Challenges Remain in Meeting Spending and Reporting Requirements

SMALL BUSINESS RESEARCH PROGRAMS. Challenges Remain in Meeting Spending and Reporting Requirements United States Government Accountability Office Report to Congressional Committees April 2015 SMALL BUSINESS RESEARCH PROGRAMS Challenges Remain in Meeting Spending and Reporting Requirements GAO-15-358

More information

FEDERAL CLOUD COMPUTING SUMMIT

FEDERAL CLOUD COMPUTING SUMMIT FEDERAL CLOUD COMPUTING SUMMIT Federal Cloud Computing Summit January 14-15, 2015 Washington Marriott at Metro Center The Federal Cloud Computing Summit will be held on January 14-15, 2015, at the Washington

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

The Five Most Common Cyber-Attack Myths Debunked

The Five Most Common Cyber-Attack Myths Debunked cybereason The Five Most Common Cyber-Attack Myths Debunked 2016 Cybereason. All rights reserved. 1 Cyber attacks show no sign of decreasing any time soon. If anything, hackers have expanded the type of

More information

West Virginia Children and Families Funding Study

West Virginia Children and Families Funding Study West Virginia Children and Families Funding Study Update and Report on Nine Year Trends in Public Expenditures FY 1999 through FY 2007 June, 2009 Supported By: Division of Criminal Justice Services / Department

More information

SolarWinds Federal Cybersecurity Survey Summary Report

SolarWinds Federal Cybersecurity Survey Summary Report SolarWinds Federal Cybersecurity Survey Summary Report March 26, 2014 2014 Market Connections, Inc. BACKGROUND AND APPROACH 2 Background and Approach SolarWinds and Market Connections worked together to

More information

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP

More information

DATA CENTER CONSOLIDATION. Reporting Can Be Improved to Reflect Substantial Planned Savings

DATA CENTER CONSOLIDATION. Reporting Can Be Improved to Reflect Substantial Planned Savings United States Government Accountability Office Report to Congressional Requesters September 2014 DATA CENTER CONSOLIDATION Reporting Can Be Improved to Reflect Substantial Planned Savings GAO-14-713 September

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

U.S. Government Receivables and Debt Collection Activities of Federal Agencies

U.S. Government Receivables and Debt Collection Activities of Federal Agencies FISCAL YEAR 2011 REPORT TO THE CONGRESS U.S. Government Receivables and Debt Collection Activities of Federal Agencies Department of the Treasury June 2012 department of the treasury washington, dc office

More information

Healthcare IT Trending Issues for 2015

Healthcare IT Trending Issues for 2015 Healthcare IT Trending Issues for 2015 January 2015 Contents Providers Start to Really Pay Attention to Privacy and Security... 3 Hospitals Take a New Interest in Upgrading Administrative Information Systems...

More information

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination GAO November 2011 United States Government Accountability Office Report to the Chairman, Subcommittee on Immigration, Refugees, and Border Security, Committee on the Judiciary U.S. Senate CYBERSECURITY

More information

FY 2012 Information Technology Budget

FY 2012 Information Technology Budget FY 2012 Information Technology Budget Cutting What We Cannot Afford & Deploying Game-Changing Technologies Vivek Kundra U.S. Chief Information Officer www.whitehouse.gov The Technology Agenda Cutting What

More information

U.S. Government Receivables and Debt Collection Activities of Federal Agencies

U.S. Government Receivables and Debt Collection Activities of Federal Agencies FISCAL YEAR 2013 REPORT TO THE CONGRESS U.S. Government Receivables and Debt Collection Activities of Federal Agencies Department of the Treasury July 2014 department of the treasury washington, dc office

More information

DEPARTMENT OF DEFENSE EDUCATION ACTIVITY 4800 MARK CENTER DRIVE ALEXANDRIA, VA 22350-1400

DEPARTMENT OF DEFENSE EDUCATION ACTIVITY 4800 MARK CENTER DRIVE ALEXANDRIA, VA 22350-1400 DEPARTMENT OF DEFENSE EDUCATION ACTIVITY 4800 MARK CENTER DRIVE ALEXANDRIA, VA 22350-1400 SEP 1 8 2013 MEMORANDUM FOR DODEA AREA DIRECTORS DEPUTY DIRECTORS FOR CURRICULUM, INSTRUCTION, AND ASSESSMENTS

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

Digital Briefing Center Presentation Sources

Digital Briefing Center Presentation Sources Digital Briefing Center Presentation Sources Communications & High Tech Communications & Big Data 74%: Telecom IT executives who say big data has positive impact on rate of innovation 74% of telecom respondents

More information

Governmentwide Transportation Management Study

Governmentwide Transportation Management Study January 2010 Governmentwide Transportation Management Study SUMMARY OF FINDINGS AND RECOMMENDATIONS DRAFT Management Consultants Where Innovation Operates Agenda Project overview Executive summary Agency

More information

Social Workers in Government Agencies

Social Workers in Government Agencies N A S W C e n t e r f o r W o r k f o r c e S t u d i e s & S o c i a l W o r k P r a c t i c e Social Workers in Government Agencies occupational profile 2011 National Association of Social Workers. All

More information

Strategic Progress Update July 2014 March 2015

Strategic Progress Update July 2014 March 2015 Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida

More information

GAO FRAUD DETECTION SYSTEMS. Centers for Medicare and Medicaid Services Needs to Ensure More Widespread Use. Report to Congressional Requesters

GAO FRAUD DETECTION SYSTEMS. Centers for Medicare and Medicaid Services Needs to Ensure More Widespread Use. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters June 2011 FRAUD DETECTION SYSTEMS Centers for Medicare and Medicaid Services Needs to Ensure More Widespread Use GAO-11-475

More information

2012 ClearanceJobs Compensation Survey

2012 ClearanceJobs Compensation Survey 2012 ClearanceJobs Survey Earnings are up for security-cleared professionals, but so are career concerns A comprehensive earnings survey of security-cleared professionals, with 11,436 respondents from

More information

california Health Care Almanac Health Care Costs 101: California Addendum

california Health Care Almanac Health Care Costs 101: California Addendum california Health Care Almanac : California Addendum May 2012 Introduction Health spending represents a significant share of California s economy, but the amounts spent on health care rank among the lowest

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Statement Of. The National Association of Chain Drug Stores. For. U.S. Senate Committee On Armed Services. Personnel Subcommittee.

Statement Of. The National Association of Chain Drug Stores. For. U.S. Senate Committee On Armed Services. Personnel Subcommittee. Statement Of The National Association of Chain Drug Stores For U.S. Senate Committee On Armed Services Personnel Subcommittee Hearing on FY2014 Budget April 17, 2012 2:00p.m. Russell Senate Office Building

More information

April 2, 2015. Re: Comments on Connected Health and Care for the Nation. Dear Dr. DeSalvo:

April 2, 2015. Re: Comments on Connected Health and Care for the Nation. Dear Dr. DeSalvo: April 2, 2015 Karen DeSalvo M.D. National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Ave, S.W., Suite 729D Washington, DC 20201 Re: Comments

More information

INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500

INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 MAY 2 8 2014 MEMORANDUM FOR DISTRIBUTION SUBJECT: Government Accountability Office (GAO) Weekly Activity Repati

More information

Health Insurance Exchange/Marketplace Privacy and Security Issues

Health Insurance Exchange/Marketplace Privacy and Security Issues Health Insurance Exchange/Marketplace Privacy and Security Issues Twenty-Second National HIPAA Summit Elizabeth A. Ferrell McKenna Long & Aldridge LLP February 6, 2014 mckennalong.com ACA Exchange System

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY United States Government Accountability Office Report to Congressional Requesters May 2016 INFORMATION TECHNOLOGY Federal Agencies Need to Address Aging Legacy Systems GAO-16-468 May 2016 INFORMATION TECHNOLOGY

More information

[This page intentionally left blank]

[This page intentionally left blank] TH [This page intentionally left blank] PREFACE [This page intentionally left blank.] [Undergoing internal DHS preface coordination.] For more information please contact NCCIC@dhs.gov SEPTEMBER 2010 i

More information

AT&T Cybersecurity Policy Overview

AT&T Cybersecurity Policy Overview AT&T Cybersecurity Policy Overview Chris Boyer AVP Public Policy July 24, 2012 2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks

More information

INFORMATION TECHNOLOGY REFORM

INFORMATION TECHNOLOGY REFORM United States Government Accountability Office Report to Congressional Requesters September 2015 INFORMATION TECHNOLOGY REFORM Billions of Dollars in Savings Have Been Realized, but Agencies Need to Complete

More information

2016 CORPORATE BRIEF ProSol Overview & Core Capabilities

2016 CORPORATE BRIEF ProSol Overview & Core Capabilities 2016 CORPORATE BRIEF ProSol Overview & Core Capabilities Training & Education Cyber Security & Information Technology Operations Planning & Support CORPORATE OVERVIEW ProSol was founded in 2002 to provide

More information

How To Calculate Teacher Compensation In The Sreb States

How To Calculate Teacher Compensation In The Sreb States Beyond Salaries: Gale F. Gaines Employee Benefits for Teachers in the SREB States Southern Regional Education Board 592 10th St. N.W. Atlanta, GA 30318 (404) 875-9211 www.sreb.org Contact Gale F. Gaines

More information

REVIEW OF THE GSA ADVANTAGE! SYSTEM REPORT NUMBER A040246/F/T/V05003. September 29, 2005

REVIEW OF THE GSA ADVANTAGE! SYSTEM REPORT NUMBER A040246/F/T/V05003. September 29, 2005 REVIEW OF THE GSA ADVANTAGE! SYSTEM REPORT NUMBER A040246/F/T/V05003 September 29, 2005 REVIEW OF THE GSA ADVANTAGE! SYSTEM REPORT NUMBER A040246/F/T/V05003 TABLE OF CONTENTS PAGE EXECUTIVE SUMMARY...i

More information

Office of Management

Office of Management Office of Management Department Of Veterans Affairs Debt Management and Collections TREASURY ANNUAL DEBT COLLECTION SYMPOSIUM Presented By: Laurie Park, Acting Deputy Assistant Secretary for Finance Department

More information

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security. Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency

More information

Healthcare Trends Report

Healthcare Trends Report Healthcare Trends Report The AMS Top Ten Trends in Healthcare Management Dedicated to Excellence in Healthcare Management AMS About the AMS Top Ten Lists has published its Top Ten Trends reports since

More information

CYBER SECURITY FOR LONG TERM EVOLUTION

CYBER SECURITY FOR LONG TERM EVOLUTION CYBER SECURITY FOR LONG TERM EVOLUTION Public Safety Networks Today and Tomorrow by Greg Harris, CIO/G6 CISSP, CAPM, CompTIA Sec+ 2008 Product Manager, Cyber and Information Assurance Solutions Harris

More information

CyberSkills Management Support Initiative

CyberSkills Management Support Initiative CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced

More information

The War on Terror in Classrooms and Clinics: An Inventory

The War on Terror in Classrooms and Clinics: An Inventory 480 Journal of Legal Education The War on Terror in Classrooms and Clinics: An Inventory Editors Note: As part of this symposium issue on the impact of the war on terror on legal education, the Journal

More information

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION OR DISCUSSION TOPIC: COMMITTEE: University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation Education

More information

Federal Network Security Survey Report

Federal Network Security Survey Report Federal Network Security Survey Report April 20, 2015 2015 Market Connec1ons, Inc. EXECUTIVE SUMMARY 2 About the Study As networks become increasingly complex and more data moves across the network vulnerability

More information

The SAFETY Act: Providing Critical Liability Protections for Cyber and Physical Security Efforts

The SAFETY Act: Providing Critical Liability Protections for Cyber and Physical Security Efforts white paper APRIL 2014 The SAFETY Act: Providing Critical Liability Protections for Cyber and Physical Security Efforts VENABLE LLP ON CYBERSECURITY LAW CALIFORNIA DELAWARE MARYLAND NEW YORK VIRGINIA WASHINGTON,

More information

Examining the Evolving Cyber Insurance Marketplace

Examining the Evolving Cyber Insurance Marketplace Prepared Testimony and Statement for the Record of Ola Sage Founder and CEO e-management Hearing on Examining the Evolving Cyber Insurance Marketplace Before the Senate Committee on Commerce, Science,

More information

Primer: The Small Business Health Options Program (SHOP) Angela Boothe October 21, 2014

Primer: The Small Business Health Options Program (SHOP) Angela Boothe October 21, 2014 Primer: The Small Business Health Options Program (SHOP) Angela Boothe October 21, 2014 Introduction On November 15th, 2014 healthcare.gov established by the Affordable Care Act (ACA) will launch an online

More information

September 24, 2015. Mr. Hogan and Ms. Newton:

September 24, 2015. Mr. Hogan and Ms. Newton: Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930

More information

San Antonio military economic impact study

San Antonio military economic impact study San Antonio military economic impact study The military generated a $27.7 billion impact From the establishment of the Presidio de Bexar in 1718, which served as the seat of government and headquarters

More information

Risk and responsibility in a hyperconnected world: Implications for enterprises

Risk and responsibility in a hyperconnected world: Implications for enterprises JANUARY 2014 Risk and responsibility in a hyperconnected world: Implications for enterprises David Chinn, James Kaplan, and Allen Weinberg For the world s economy to get full value from technological innovation,

More information

EMERGENCY SUPPORT FUNCTION ANNEXES: INTRODUCTION

EMERGENCY SUPPORT FUNCTION ANNEXES: INTRODUCTION EMERGENCY SUPPORT FUNCTION ANNEXES: INTRODUCTION Purpose This section provides an overview of the Emergency Support Function (ESF) structure, common elements of each of the ESFs, and the basic content

More information

Billing Code: 3510-EA

Billing Code: 3510-EA Billing Code: 3510-EA DEPARTMENT OF COMMERCE Office of the Secretary National Institute of Standards and Technology National Telecommunications and Information Administration [Docket Number: 130206115-3115-01]

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)

More information

Economic Profile THE ECONOMIC CONTRIBUTIONS OF DATA CENTERS IN NORTH CENTRAL WASHINGTON WASHINGTON RESEARCH COUNCIL

Economic Profile THE ECONOMIC CONTRIBUTIONS OF DATA CENTERS IN NORTH CENTRAL WASHINGTON WASHINGTON RESEARCH COUNCIL WASHINGTON RESEARCH COUNCIL Economic Profile THE ECONOMIC CONTRIBUTIONS OF DATA CENTERS IN NORTH CENTRAL WASHINGTON January 2010 WASHINGTON RESEARCH COUNCIL 16300 Christensen Road, Suite 207 Tukwila, Washington

More information

This directive applies to all DHS Organizational Elements (OE) except the Office of Inspector General.

This directive applies to all DHS Organizational Elements (OE) except the Office of Inspector General. Department of Homeland Security Management Directive System MD Number 731 Issue Date: 8/2/2004 STRATEGICALLY SOURCED COMMODITIES POLICY AND PROCEDURES 1. Purpose This Management Directive (MD) identifies

More information

Memorandum of Understanding Between the Department of Energy Managing Partner Financial Management Line of Business And Nuclear Regulatory Commission

Memorandum of Understanding Between the Department of Energy Managing Partner Financial Management Line of Business And Nuclear Regulatory Commission Memorandum of Understanding Between the Department of Energy Managing Partner Financial Management Line of Business And Nuclear Regulatory Commission I. Purpose The purpose of this Memorandum of Understanding

More information

Developing a Mature Security Operations Center

Developing a Mature Security Operations Center Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and

More information

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government

More information

Direct Economic Impact of Federal Spending within Hampton Roads FY 2009 2010

Direct Economic Impact of Federal Spending within Hampton Roads FY 2009 2010 Direct Economic Impact of Federal Spending within Hampton Roads FY 2009 2010 By Marco A. Martin Release Date: July 16, 2012 Acknowledgments I would like to first credit my supervisor, retired Rear Admiral

More information

Large and Small Companies Exhibit Diverging Bankruptcy Trends

Large and Small Companies Exhibit Diverging Bankruptcy Trends JANUARY, 22 NUMBER 2-1 D I V I S I O N O F I N S U R A N C E Bank Trends Analysis of Emerging Risks In Banking WASHINGTON, D.C. ALAN DEATON (22) 898-738 adeaton@fdic.gov Large and Small Companies Exhibit

More information

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C. 20503. December 5, 2012

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C. 20503. December 5, 2012 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C. 20503 DEPUTY DIRECTOR FOR MANAGEMENT December 5, 2012 M-13-02 MEMORANDUM FOR TH~E HEADS OF EXECUTIVE DEPARTMENTS AND

More information

National Health Information Sharing & Analysis Center. The National Health ISAC (NH-ISAC) NH-ISAC

National Health Information Sharing & Analysis Center. The National Health ISAC (NH-ISAC) NH-ISAC National Health Information Sharing & Analysis Center The National Health ISAC (NH-ISAC) NH-ISAC Physical Threats Cyber Impacts 2 (NH-ISAC) National Healthcare & Public Health Cybersecurity Protection

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Corporate Spying An Overview

Corporate Spying An Overview Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential

More information

Carney, Inc. helps Federal agencies accelerate workforce performance

Carney, Inc. helps Federal agencies accelerate workforce performance Carney, Inc. helps Federal agencies accelerate workforce performance In the face of rapidly developing national priorities, an inundation of information, and constrained resources, the need to enable the

More information

GAO DATA CENTER CONSOLIDATION. Agencies Making Progress on Efforts, but Inventories and Plans Need to Be Completed. Report to Congressional Requesters

GAO DATA CENTER CONSOLIDATION. Agencies Making Progress on Efforts, but Inventories and Plans Need to Be Completed. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters July 2012 DATA CENTER CONSOLIDATION Agencies Making Progress on Efforts, but Inventories and Plans Need to Be Completed

More information

Economic Development Planning, Summary 7

Economic Development Planning, Summary 7 Economic Development Planning, Summary 7 Unless otherwise noted, summaries represent findings and analyses by the listed source, not by Morrison Institute for Public Policy or Arizona State University.

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

BIG SHIFT TO CLOUD-BASED SECURITY

BIG SHIFT TO CLOUD-BASED SECURITY GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,

More information

Interagency Advisory Board Meeting Agenda, March 5, 2009

Interagency Advisory Board Meeting Agenda, March 5, 2009 Interagency Advisory Board Meeting Agenda, March 5, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy

More information

Comments :Incentives To Adopt Improved Cybersecurity Practices

Comments :Incentives To Adopt Improved Cybersecurity Practices Comments :Incentives To Adopt Improved Cybersecurity Practices 1. Do particular business sectors or company types lack sufficient incentives to make cybersecurity investments more than others? If so, why?

More information

The art of the possible.

The art of the possible. IBM Scalable Modular Data Center The art of the possible. Rapidly deploying cost-effective, energy-efficient data centers APC InfraStruXure Rapidly deploying cost-effective, energy-efficient data centers

More information

Secretary of the Senate Office of Public Records 232 Hart Building Washington, DC 20510 http://www.senate.gov/lobby

Secretary of the Senate Office of Public Records 232 Hart Building Washington, DC 20510 http://www.senate.gov/lobby Page 1 of 12 Clerk of the House of Representatives Legislative Resource Center B-106 Cannon Building Washington, DC 20515 http://lobbyingdisclosure.house.gov Secretary of the Senate Office of Public Records

More information

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of

More information

FEDERAL SOFTWARE LICENSES

FEDERAL SOFTWARE LICENSES United States Government Accountability Office Report to the Chairman, Committee on Homeland Security and Governmental Affairs, U.S. Senate May 2014 FEDERAL SOFTWARE LICENSES Better Management Needed to

More information

THE STATE OF THE ECONOMY

THE STATE OF THE ECONOMY THE STATE OF THE ECONOMY CARLY HARRISON Portland State University Following data revisions, the economy continues to grow steadily, but slowly, in line with expectations. Gross domestic product has increased,

More information

U.S. Government Receivables and Debt Collection Activities of Federal Agencies

U.S. Government Receivables and Debt Collection Activities of Federal Agencies FISCAL YEAR 2014 REPORT TO THE CONGRESS U.S. Government Receivables and Debt Collection Activities of Federal Agencies Department of the Treasury May 2015 department of the treasury washington, dc office

More information

Virginia s Cybersecurity Industry

Virginia s Cybersecurity Industry Cybersecurity Virginia IT companies, from startups to large systems integrators, are leaders in the development of cyber security solutions for industry and government. Currently 67,850 people work in

More information

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border

More information

Customer-Centric Opportunities in Big Data

Customer-Centric Opportunities in Big Data Customer-Centric Opportunities in Big Data Customer-Centric OPPORTUNITIES in BIG DATA Companies across most every commercial sector are scrambling to capitalize on opportunities created by the massive

More information

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago

More information

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson jfeigelson@debevoise.com WASHINGTON, D.C. Satish M. Kini smkini@debevoise.com Renee

More information

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information

More information

GAO CYBERSECURITY. Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative

GAO CYBERSECURITY. Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative GAO United States Government Accountability Office Report to Congressional Requesters March 2010 CYBERSECURITY Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National

More information

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information