COMMENTARY

Cyber opportunities are hot in 2012

The 2012 Federal IT budget request is $80.9 billion, with most federal IT spending requests slightly ahead of 2011 levels. Priorities include telework and mobile computing as well as cloud computing and virtualization. Yet, according to a recent federal IT budget briefing covered in Washington Technology magazine at the end of October, significant risks are associated with mobile computing and cloud-based applications. For that reason, cyber security will continue to top federal IT technology spending trends.

Commercial technology products are critical to achieving operating efficiencies and cost savings demanded by government agencies. Many opportunities still exist for IT manufacturers and their channel partners in all the many civilian and DoD initiatives focusing on cyber security.

On the civilian side, for example, the Department of Health and Human Services emphasizes a need for commercial off-the-shelf solutions for security. HHS identifies security as a critical IT requirement in programs including the Resource and Patient Management System and the Healthcare Integrated General Ledger Accounting System. The Department of Treasury also names security as one of its top IT requirements in programs like the Customer Account Data Engine 2, IRS.GOV (Portal Environment), and Treasury Enterprise Identity, Credential and Access Management.

The Federal Bureau of Investigation also stresses security in creating a resilient, agile, and secure infrastructure, and plans to specifically focus on creating secure and flexible networks. The Department of Justice as a whole incorporated security into its overall IT strategy with an emphasis on securing infrastructure and embedding cybersecurity to fend off attacks.

Furthermore, the Department of Commerce places a key focus on cyber security in its enterprise cybersecurity monitoring and operations to permit continuous monitoring of Commerce systems and provide an enterprise-wide cybersecurity operations center. Additionally, the mission and fiscal 2012-17 goals of the Department of Energy’s CIO include risk-based cybersecurity and plans to strengthen enterprise situational awareness, protect critical infrastructure, and advance technologies for cyber defenses.

The Defense Department places a particular emphasis on cybersecurity. It established USCYBERCOM in June 2009 to coordinate activities to defend and protect DoD information networks. By July 2011, the DoD released its first unified strategy for operating in cyber space, thus renewing its focus on cyber threats. These include external and insider threats, supply chain vulnerabilities, and threats to the DoD’s operational ability.

In the Air Force, cybersecurity remains one of CIO Lt. General William Lord’s top priorities. This includes establishing a “layered defense” to improve the Air Force’s information security using technologies such as real-time deep packet inspection and network mapping. He also emphasizes a need for training to develop technical skills to work within cyberspace.

The Army IT budget is slated for the largest percentage and dollar increase across all of DoD, and cyber security remains one of its top priorities. In the past year, ARCYBER directs the Army to integrate full-spectrum cyber capabilities, ensure mission command, and achieve cyber domain operational freedom by 2020. Recognizing the intense budgetary pressures that Army is facing, Major General Rhett Hernandez, ARCYBER commander, indicates he is addressing the acquisition process to make it more responsive and ensure cybersecurity gets factored into buying decisions.

The Navy established the U.S. Fleet Cyber Command in January 2010. A key component is the Navy Cyber Defense Operations Command (NDOC), responsible for the defense of the Navy’s computer networks and systems and their 700,000 users worldwide, including NIPRNet and SIPRNet enclaves and legacy networks. NCDOC launched the Navy Cyber Defense Core, which provides a one-stop-shop for the consumption of information based on data gathered, analyzed, and housed within the Navy’s cyber defense systems.

Because of this enhanced interest in cybersecurity, federal budgets will continue to be directed to this are, and requirements will be formed where the needs are most critical. Sales representatives who are told there is no money to spend may not be delivering the right message to the right prospect.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts

  • How Do You Support the Project Lifecycle?

    How do best-in-class project-based companies create and actively mature successful organizations? They find the right mix of people, processes and tools that enable them to effectively manage the project lifecycle. REGISTER for this webinar to hear how properly managing the cycle of capture, bid, accounting, execution, IPM and analysis will allow you to better manage your programs to stay on scope, schedule and budget. Learn More!

  • Sequestration, LPTA and the Top 100

    Join Washington Technology’s Editor-in-Chief Nick Wakeman as he analyzes the annual Top 100 list and reveals critical insights into how market trends have impacted its composition. You'll learn what movements of individual companies means and how the market overall is being impacted by the current budget environment, how the Top 100 rankings reflect the major trends in the market today and how the biggest companies in the market are adapting to today’s competitive environment. Learn More!