Collaborative Programs at DHS | Bridging Edge Computing and Data | Strengthening Cybersecurity

 

November 3, 2024

Presented by Owl Cyber Defense

Collaborative AI Cybersecurity and Vulnerability Programs at DHS

IMG_1571-1Hemant Baidwan, Chief Information Security Officer (CISO) at the Department of Homeland Security (DHS), highlights the Department's commitment to integrating AI into its cybersecurity framework in a secure and responsible manner. DHS’s approach includes collaboration with a wide range of stakeholders, such as privacy experts, legal teams, and IT specialists, to ensure AI solutions meet security and ethical standards. The CISO Council, a central governing body within DHS, plays a crucial role in coordinating efforts across various components, enabling the secure use of AI for diverse missions, from disaster response to border protection. Baidwan also discusses the success of programs like "Hack DHS" and the Vulnerability Disclosure initiative, which invite vetted researchers and the public to identify and report vulnerabilities. These programs provide DHS with essential insights to address potential cybersecurity gaps proactively, particularly in AI-driven systems. Together, these initiatives bolster DHS’s cybersecurity capabilities and foster a proactive risk management culture.

Key Takeaways:

  1. Cross-department collaboration with a diverse range of stakeholders supports secure and responsible AI deployment.

  2. The DHS CISO Council enhances mission support through a unified approach to cybersecurity across all components.

  3. Programs like Hack DHS and the Vulnerability Disclosure initiative proactively involve researchers in detecting vulnerabilities, enhancing cybersecurity readiness.

 

Bridging Edge Computing and Data Sharing Across Civilian and Defense Agencies

IMG_1484Dan O’Donohue, Senior Vice President of Strategic Programs at Owl Cyber Defense, discusses the pivotal role of edge computing and secure data sharing in strengthening national response capabilities between the Department of Defense (DoD) and civilian agencies. While the DoD has pioneered edge computing solutions due to pressing security threats, O’Donohue emphasizes that similar data-sharing capabilities are now critical for civilian agencies, especially for crisis responses to natural disasters and infrastructure vulnerabilities. Effective data exchange across agencies, often working with different data standards and classification levels, presents both technological and cultural challenges. O’Donohue highlights the long-standing culture of over-classification within the DoD, which restricts data mobility and prevents the seamless flow of critical information in high-stress scenarios. To address this, he advocates for AI and decentralized data mesh technologies, which create flexible, real-time data environments to support rapid, on-the-ground decision-making. He further explains that cross-domain solutions, which prevent malware intrusions and secure classified information, enable real-time data sharing essential for both tactical and strategic operations.

Key Takeaways:

  1. Civilian agencies must adopt DoD-style edge computing and secure data-sharing capabilities to respond more effectively in crisis scenarios.

  2. Breaking down data silos and addressing over-classification is crucial to support real-time, cross-agency information sharing.

  3. Continuous experimentation and feedback loops enhance edge computing solutions, improving adaptability for defense and civilian missions alike.

 

Strengthening Cybersecurity at SSA through Risk Management and Workforce Innovation

IMG_5092Tim Amerson, Deputy Chief Information Security Officer at the Social Security Administration (SSA), discusses the agency’s implementation of a cybersecurity risk management framework focused on proactive data protection and organizational resilience. Amerson explains that the SSA combines compliance and risk-based strategies to enhance cybersecurity, utilizing initiatives like phishing simulations for new employees and regular scorecard assessments to gauge security posture. The agency's scorecard, informed by OMB and CISA metrics, tracks and improves cybersecurity measures such as data encryption and network scanning. Emphasizing workforce development, Amerson shares the importance of a skills-based hiring approach and the development of internal training programs for current employees interested in cybersecurity roles. SSA also prioritizes supply chain risk management, strengthening partnerships with vendors to ensure transparency in software and hardware origins, addressing the complex security needs associated with AI and automation in government services.

Key Takeaways:

  1. SSA’s cybersecurity framework combines compliance and proactive risk management, reducing phishing risks with targeted onboarding and training.

  2. The agency’s scorecard system, based on OMB and CISA metrics, aids in regularly monitoring and improving cybersecurity posture.

  3. SSA emphasizes skills-based hiring and internal cybersecurity training programs to address workforce needs and bolster security expertise.

Join our Newsletter

Please fill out the requested information below