{
    "version" : "https://jsonfeed.org/version/1",
    "content" : "news",
    "type" : "single",
    "title" : "Enhancing our Nation&#8217;s Cybersecurity |Digital.gov",
    "description": "Enhancing our Nation&#8217;s Cybersecurity",
    "home_page_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/","feed_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/07/14/enhancing-our-nations-cybersecurity/index.json","item" : [
    {"title" :"Enhancing our Nation\u0026#8217;s Cybersecurity","summary" : "The mission of U.S. General Services Administration (GSA)’s Integrated Technology Services (ITS) is to deliver best value technology solutions to the government and the American people, and one of the most critically important capabilities that our nation currently needs is strengthened cybersecurity. We have been working with numerous other federal agencies to ensure that the","date" : "2016-07-14T14:00:04-04:00","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"mary-davie" : "Mary Davie"},"topics" : {
        
            "acquisition" : "Acquisition",
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-07-14-enhancing-our-nations-cybersecurity.md",
      
      "filepath" :"news/2016/07/2016-07-14-enhancing-our-nations-cybersecurity.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/07/2016-07-14-enhancing-our-nations-cybersecurity.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/07/2016-07-14-enhancing-our-nations-cybersecurity.md","slug" : "enhancing-our-nations-cybersecurity","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/07/14/enhancing-our-nations-cybersecurity/","content" :"\u003cp\u003eThe mission of U.S. General Services Administration (GSA)’s Integrated Technology Services (ITS) is to deliver best value technology solutions to the government and the American people, and one of the most critically important capabilities that our nation currently needs is strengthened cybersecurity. We have been working with numerous other federal agencies to ensure that the government has the tools and know-how it needs to protect our systems, data, and information. \u003cdiv class=\"image\"\u003e\n  \u003cimg\n    src=\"https://s3.amazonaws.com/digitalgov/_legacy-img/2016/07/600-x-450-Many-red-opened-locks-around-one-closed-blue-lock-maxkabakov-iStock-Thinkstock-148650499.jpg\"\n    alt=\"Many red opened locks around one closed blue lock against a binary background.\"/\u003e\u003c/div\u003e\n\n\u003c/p\u003e\n\u003cp\u003eRecognizing the criticality of our cyber posture and challenges, the Obama Administration implemented the \u003ca href=\"http://www.gsa.gov/portal/content/129694\"\u003eCybersecurity National Action Plan (CNAP)\u003c/a\u003e. This plan has enacted immediate and long-term strategies to enhance cybersecurity awareness and protections. Another key part of CNAP is the IT Modernization Fund, which will channel $3.1 billion in IT spending to modernize, retire, or replace the most vulnerable and important systems in government.\u003c/p\u003e\n\u003cp\u003eIn addition, the Office of Management and Budget (OMB) \u003ca href=\"https://www.whitehouse.gov/sites/default/files/omb/memoranda/2016/m-16-04.pdf\"\u003eMemorandum M-16-04\u003c/a\u003e, Cybersecurity Strategy and Implementation Plan (CSIP) for the Federal Civilian Government, directs GSA to research contract vehicle options and develop a capability to deploy incident response services that can quickly be leveraged by federal agencies.\u003c/p\u003e\n\u003cp\u003eIn support of the President and OMB’s direction, and as a proactive federal partner, we recently hosted two industry days to learn about capabilities and suggestions for what kind of capabilities exist to support the acquisition of Highly Adaptive Cybersecurity Services (HACS).\u003c/p\u003e\n\u003ch2 id=\"cybersecurity-outreach\"\u003e\u003cstrong\u003eCybersecurity Outreach\u003c/strong\u003e\u003c/h2\u003e\n\u003cp\u003eThese two events brought together our government and industry partners to discuss the importance of CNAP, why it was implemented, its requirements, and possible impacts to stakeholders. We promoted developing proactive and reactive cybersecurity programs within departments that provide a strategic view of how organizations manage cybersecurity risks. The workshop that took place yesterday was the first of its kind in Silicon Valley and was an encore to the very successful, beyond capacity, Washington D.C.-based session held last month.\u003c/p\u003e\n\u003ch2 id=\"highly-adaptive-cybersecurity-services\"\u003e\u003cstrong\u003eHighly Adaptive Cybersecurity Services\u003c/strong\u003e\u003c/h2\u003e\n\u003cp\u003eIn addition to these informational events, we’ve also been working on meaningful updates to our acquisition vehicles for cybersecurity. One result of this effort was a Request for Information (RFI) that we released in June to seek input related to our proposed HACS \u003ca href=\"http://www.gsa.gov/portal/content/104506\"\u003eIT Schedule 70\u003c/a\u003e Special Item Number (SIN).\u003c/p\u003e\n\u003cp\u003eIn today’s active threat environment, vulnerability assessments, incident detection and response, and security engineering are ongoing challenges for many organizations. Our SIN initiative will directly support CNAP and allow us to offer services from highly qualified companies that federal agencies can quickly use. These services include incident response, penetration testing, and hunt services from leading commercial providers categorized as providing proactive, reactive, and remediation services.\u003c/p\u003e\n\u003cp\u003eCreating these new SINs, in support of CNAP and CSIP, will allow our customers to easily acquire HACS through IT Schedule 70. It will also provide a way for our industry partners to more easily differentiate these specific cybersecurity services from other IT offerings. The HACS SIN is slated to be active on August 30, 2016.\u003c/p\u003e\n\u003ch2 id=\"a-secure-future\"\u003e\u003cstrong\u003eA Secure Future\u003c/strong\u003e\u003c/h2\u003e\n\u003cp\u003eThese initiatives are just a few of the steps we’ve taken to help ensure that the federal government has the tools it needs to protect privacy, maintain public safety, and keep our economic and national systems secure.\u003c/p\u003e\n\u003cp\u003eFor more information, please read our \u003ca href=\"https://interact.gsa.gov/document/gsa-proposes-new-highly-adaptable-cybersecurity-services-special-item-number-sin\"\u003eInteract post\u003c/a\u003e on the topic. As always, please follow us on Twitter \u003ca href=\"https://twitter.com/#!/GSA_ITS\"\u003e@GSA_ITS\u003c/a\u003e and \u003ca href=\"https://goo.gl/gSRnIJ\"\u003eLinkedIn\u003c/a\u003e to join our ongoing conversations about government IT.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eRelated posts:\u003c/strong\u003e\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003ca title=\"Permanent Link: Strengthening Federal Cybersecurity\" href=\"https://gsablogs.gsa.gov/gsablog/2016/04/11/strengthening-federal-cybersecurity/\" rel=\"bookmark\"\u003eStrengthening Federal Cybersecurity\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca title=\"Permanent Link: GSA IT: The Frontline of Cybersecurity\" href=\"https://gsablogs.gsa.gov/gsablog/2014/08/26/gsa-it-the-frontline-of-cybersecurity/\" rel=\"bookmark\"\u003eGSA IT: The Frontline of Cybersecurity\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca title=\"Permanent Link: GSA Leads the Way in Providing Better Cybersecurity\" href=\"https://gsablogs.gsa.gov/gsablog/2015/10/27/gsa-leads-the-way-in-providing-better-cybersecurity/\" rel=\"bookmark\"\u003eGSA Leads the Way in Providing Better Cybersecurity\u003c/a\u003e\u003cem\u003eThis post was originally published on the \u003ca href=\"https://gsablogs.gsa.gov/\"\u003eGSA blog\u003c/a\u003e.\u003c/em\u003e\u003c/li\u003e\n\u003c/ol\u003e\n"}
  ]
}
