Our organization is thinking about participating in the DHS Enhanced Cybersecurity Services program, but I heard...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
that it requires that staff have security clearances. Is that true, and how difficult is it to get U.S. security clearance?
The Enhanced Cybersecurity Services (ECS) program, sponsored by the Department of Homeland Security, had a lofty goal: to provide a channel to share classified threat information with private industry in order to boost overall cybersecurity. However, the program has fallen flat due to the high bureaucratic hurdles put in place to participation.
Your question hits upon one of the two major issues: Employees who will handle information from DHS must have valid U.S. security clearances. Obtaining clearance is an expensive and time-consuming process. Unless your business already has a requirement to handle classified information, you're likely to find that the benefits provided by the program don't justify the investment of time and money required to obtain high-level security clearances for your IT staff.
Ask the expert!
Got a vexing problem for Mike Chapple or any of our other experts? Ask your enterprise-specific questions today! (All questions are anonymous.)
The second major barrier is that a security clearance is necessary, but not sufficient, to handle classified information. You must also have the IT infrastructure in place to ensure that there is no commingling of classified and unclassified information. This requires building a secure classified network and building systems dedicated to handling this type of information.
The bottom line is that the program is unlikely to expand beyond the small group of industries that already handle sensitive information. The numbers seem to back this opinion. DHS reported that only 17 businesses joined the program in its first year of operation.
Organizations interested in cybersecurity information sharing would be well-served to look into the growing number of industry-specific information security and analysis centers (ISACs) that foster sharing between the public and private sectors.
MSPs look to expand portfolios to include cybersecurity services
Dig Deeper on Government IT Security Management
Related Q&A from Mike Chapple
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ...continue reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ...continue reading
Now that NIST has deprecated the use of SMS 2FA, should nongovernment organizations follow suit? Expert Mike Chapple discusses the risks of SMS-based...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.