Department of Homeland Security

A top National Security Agency executive argued today that if the nation is to defend against escalating cyber threats, it will be increasingly important for individuals, corporations and institutions, including government, to be held more accountable for their contributions to, and their actions within, cyber space.

At the same time, there are limits to what actions private enterprises can take in protecting their networks, said NSA Deputy Director Chris Inglis, speaking at an Intelligence and National Security Alliance forum in Washington. Keep reading →

The Obama Administration is pushing ahead with a series of cybersecurity initiatives to protect critical national infrastructure from attack. At the heart of the process are a series of steps designed to improve how government networks detect and deter intruders, report incidents and work with local and international law enforcement to imprison cyber criminals.

Michael Daniel, special assistant to the president and White House cybersecurity coordinator, explained White House priorities for cybersecurity today at the INSA Cyber Innovation Symposium in Washington, DC. They include: securing federal networks, protecting critical infrastrucure, cyber reporting and response, cyber intelligence, and international engagement. Keep reading →

When the Department of Homeland Security hired Chief Information Officer Richard Spires three years ago, he became the seventh CIO in eight years tasked with bringing rationality to DHS‘s unwieldy IT fiefdoms – and delivering on a mandate for sharing information across the department.

Spires, a former IRS deputy commissioner in charge of operations, quickly set his sights beyond technology matters, persuading the department’s top officials that to succeed, it would take a functioning governance board and the commitment of top leadership to support that governance if DHS was to achieve those goals.

That effort, followed by a systematic portfolio review of every major IT program across the DHS, is clearly paying off, according to a Congressional report from the Government Accountability Office. The report, issued Sept. 18, generally praised the Department of Homeland Security for making progress in achieving its information-sharing mission. But it also cautioned DHS that further steps should be taken to continue that progress and improve its efforts.

The GAO auditors reviewed information obtained from customers of DHS’s information sharing efforts, including 10 of 77 fusion centers, where states and major urban areas collaborate with federal agencies to improve information sharing; 1 of 7 DHS operational components who participate in the DHS Intelligence Enterprise, ICE; and 2 of DHS’s 16 intelligence community customers, the Office of the Director of National Intelligence (ODNI) and the Federal Bureau of Investigation (FBI).

Investigators concluded DHS’s governance board is proving effective in enhancing collaboration among DHS components. The board has also developed and documented a process to prioritize some of the initiatives for additional oversight and support.

However, GAO said DHS needs to do more to sustain its progress: specifically updating its processes for identifying information-sharing gaps and the results; and analyzing root causes of those gaps. It also said DHS lacks an institutional record that would help it replicate and sustain

those information-sharing efforts.

The report also noted that funding constraints appear to be having a significant impact on DHS’s key information-sharing initiatives.

“Progress has slowed for half of the 18 key initiatives, in part because of funding constraints,” the investigation found, noting five of DHS’s top eight priority information-sharing initiatives

currently face funding shortfalls.

The governance board has not been able to secure additional funds for these initiatives because they ultimately compete for funding within the budgets of individual components, although the board’s involvement has kept some initiatives from experiencing funding cuts, according to DHS officials.

DHS’s eight priority information-sharing initiatives, as of September 2012, include:

  • Controlled Homeland Information Sharing Environment
  • Information Sharing Segment Architecture Transition
  • Law Enforcement Information Sharing Initiative
  • Common Operating Picture/User-Defined Operation Picture
  • Traveler Enforcement Compliance System Modernization
  • Private Sector Information Sharing Work Plan
  • Homeland Secure Data Network
  • Homeland Security Information Network
However, GAO also noted that “DHS has not yet determined the specific capabilities each particular program must implement for DHS to conclude that it has improved information sharing enough to achieve its information-sharing vision for 2015.”

Establishing the level of capabilities programs must implement could help DHS prioritize programs, and track and assess progress toward its vision, the report said.

DHS responded to GAO’s report, saying department officials concurred with GAO’s recommendations.


Cybersecurity is on the top of many public and private sector IT agendas these days. But while organizations focus on the software and hardware to police networks, they often don’t consider the standards necessary to have all those defenses working together, or the possible cost savings that can be achieved through improved cybersecurity.

Standards and guidelines are often overlooked in the cybersecurity space in favor of cost savings, said Donna Dodson, deputy cybersecurity advisor at the National Institute of Standards and Technology. Keep reading →

If the Department of Defense couldn’t account for the tanks, planes and weapons it purchased, there would be hearings and heads would roll. If the Social Security Administration didn’t track who paid into the system and who is eligible for benefits, the system would collapse. If the Nuclear Regulatory Commission didn’t have systems in place to track the nation’s fissionable material…the public outcry would be deafening.

In truth, no government agency can function without the ability to see, manage and account for the core assets critical to its mission. But in essence, that’s what’s happening right now with the federal government’s software assets. And legislators are getting wind of this disconcerting fact, and they’re taking action.

It shouldn’t come as a shock to anyone who knows their way around an iPhone that apps have infiltrated how we live, work and govern. “There’s an app for that” applies to every aspect of our lives, our jobs, and our federal government. Without software, the very cogs of government would not function.

And the government buys a lot of software. According to research firm IDC the federal government will spend more than $9 billion on software this year. And much of that spend will be wasted.

Most organizations spend too much – anywhere from 10% to 30% too much – on software, based on experience. It’s wasted when organizations purchase too much software that they don’t need – turning software into “shelfware.” It’s also wasted when organizations don’t understand and apply their license entitlements, such as vendor-specific product use rights, and when enterprises don’t purchase the right license types for their users.

The problem is so pervasive mainly due to the complexity involved in tracking and managing software licensing and usage.

“It sounds counter intuitive, but it’s very difficult to know how much software an organization actually has versus how much it actually uses. And if you don’t know this, you can’t accurately determine how much you need to buy,” said Amy Konary, research vice president, Software Licensing at IDC.

License agreements are enormously complex and can be hundreds of pages long and contain very detailed rules around installation and usage that must be adhered to. When you consider that the federal government runs at least thousands of different software applications, managing this asset becomes extremely complex,” she said.

But increasingly, federal agencies are becoming bolder about tackling the problem – because the payoff can be so substantial.

For instance, one US military agency we’ve worked with was facing budget cuts of one third, or $15 million, in its IT operational costs for fiscal year 2012. In order to avoid slashing mission-critical services, the agency got creative in looking for new pools of waste – and discovered that software license optimization was an untapped resource for significant cost reduction.

The agency piloted the concept, by focusing on optimizing just one of the hundreds of applications that it runs – in its case, Autodesk design software. In the process, it slashed the number of licenses it needed by three quarters, and reduced its annual software maintenance bill by more than $3 million, for a total 6-year realized savings of more than $17 million in maintenance costs – for just this one piece of software.

The agency now believes that it can achieve its budget cut objective solely through centralized software license optimization.

Once an organization arms itself with visibility into how much software it actually needs, how much it uses, how much it owns and what its usage rights are, the potential savings are often staggering. The magnitude of this agency’s cost-savings is typical for what we see in both private enterprise as well as the federal government.

Feds Are Getting the Message

Government officials are waking up to the opportunity. With acrimony in Congress at an all-time high, the appetite for compromise at an all time low, and the drumbeat for budget reductions relentless, the lure of cutting billions of dollars in unnecessary waste from the federal budget – without controversy or the need for political brinkmanship – is irresistible.

On September 21, 2011, the Senate Homeland Security and Governmental Affairs Committee approved its version of the DHS Authorization Bill (S. 1546). The bill included language that requires the Chief Information Officer (CIO) of the Department to achieve the greatest possible economies of scale and cost-savings in the procurement of software licenses.

Congressman Joe Walsh (R-IL) also connected the dots between federal spending waste and software licenses. In October, 2011, he announced the successful introduction of an amendment to H.R. 3116 in the House version of the Department of Homeland Security authorization bill to eliminate wasteful software license spending.

Agency and department heads are also getting the message. In April, 2012, Department of Defense CIO Teri Takai, as part of a House Oversight and Government Reform Committee hearing examining efforts to reduce waste in IT spending, was asked about the department’s efforts to improve software license optimization.

Takai’s response:

“The department understands the importance of effective IT asset management in order to avoid over buying or over deployment of commercial software… To this end, the department proactively shares best practices, such as the Navy Facilities Engineering Command’s enterprise license optimization approach, with and among Defense Components. Establishing and enhancing an IT asset management framework for use in the department that includes software license management optimized at the enterprise level is an element of the emerging DoD Joint Information Environment.”

And more recently the Senate Committee on Armed Services took notice and has proposed language to ferret out waste in federal software procurement. In Section 931 of National Defense Authorization Act for 2013, the senate version of the bill text directs the CIO of the Department of Defense to conduct an inventory of software licenses and consolidate the department’s software spend.

Similar reforms in software procurement are being considered in other legislation, and will be watched closely by budget hawks this fall when Congress convenes after recess.

Perhaps the momentum behind software license optimization is building because it is so fruitful and yet non-controversial.

“Businesses and governments are now awakening to the extent of the waste that exists in most software procurement processes,” said Konary. “If you can apply some best practices and technology to solve an expensive problem that at one time was unknown or appeared intractable – why wouldn’t you?”


Steve Schmidt is vice president of corporate development at Flexera Software.

More federal managers view information technology as an opportunity than as a cost, according to a new survey released this week. But with so many other priorities on executives’ plates, and the sense that IT departments could be delivering more effectively than many are, technology leaders have their work cut out in demonstrating that IT can contribute to real cost savings or to better decision making.

More than two thirds of federal executives believe their IT departments understand their agency’s missions and grasp their agencies core challenges. Keep reading →

We’re down to the last few agencies making the move from our Federal Telecommunications Service 2001 (FTS 2001) contract to the Networx contracts and I am proud of the work we’ve done with our agency partners and OMB to make Networx a success.

As many of you know, the Networx transition has not been easy. While the adoption has experienced challenges, we continue to work with agencies and industry to improve the offering, ease the transition, and highlight its benefits. In fact, we are applying the lessons learned from this effort to ensure our future program and offerings are an unqualified success. Keep reading →


Innovation seems to be this decade’s buzzword. It’s what “synergy” was to the 1990s, but what does it really mean?

Put simply, innovation is the process of improving, adapting or creating a product, system or service. According to federal employees, some agencies do it better than others. Keep reading →


The Bipartisan Policy Center produced a report that is getting a fair amount of attention and raising some concerns. The report stated that the number of cyber attacks appears to be on the rise, along with financial losses.

This data was based on information from October 2011 through February 2012. The report indicates, that over 50,000 cyber attacks on private and government networks were reported to the Department of Homeland Security, including 86 attacks on “critical infrastructure networks.” Information also indicated that many private firms keep the fact that they experienced a cyber attack secret “because of fears, some justified, including harm to their reputations and potential loss of customers.” Keep reading →


The Defense Department has launched a barrage of programs across the services to provide its civilian and uniformed personnel with mobile devices. Overseeing this vast and varied process is the Defense Information Systems Agency, which is responsible for running many of the department’s mobile pilot programs and setting up the infrastructure to provide applications and services to warfighters.

The head of DISA and top technology officers outlined how individual agencies fit into those efforts at the Defense & Security Mobile Technologies Symposium in Washington, D.C. last week. Keep reading →

Page 2 of 7123456...7