Our organization is thinking about participating in the DHS Enhanced Cybersecurity Services program, but I heard...
that it requires that staff have security clearances. Is that true, and how difficult is it to get U.S. security clearance?
The Enhanced Cybersecurity Services (ECS) program, sponsored by the Department of Homeland Security, had a lofty goal: to provide a channel to share classified threat information with private industry in order to boost overall cybersecurity. However, the program has fallen flat due to the high bureaucratic hurdles put in place to participation.
Your question hits upon one of the two major issues: Employees who will handle information from DHS must have valid U.S. security clearances. Obtaining clearance is an expensive and time-consuming process. Unless your business already has a requirement to handle classified information, you're likely to find that the benefits provided by the program don't justify the investment of time and money required to obtain high-level security clearances for your IT staff.
Ask the expert!
Got a vexing problem for Mike Chapple or any of our other experts? Ask your enterprise-specific questions today! (All questions are anonymous.)
The second major barrier is that a security clearance is necessary, but not sufficient, to handle classified information. You must also have the IT infrastructure in place to ensure that there is no commingling of classified and unclassified information. This requires building a secure classified network and building systems dedicated to handling this type of information.
The bottom line is that the program is unlikely to expand beyond the small group of industries that already handle sensitive information. The numbers seem to back this opinion. DHS reported that only 17 businesses joined the program in its first year of operation.
Organizations interested in cybersecurity information sharing would be well-served to look into the growing number of industry-specific information security and analysis centers (ISACs) that foster sharing between the public and private sectors.
MSPs look to expand portfolios to include cybersecurity services
Dig Deeper on Government information security management
Related Q&A from Mike Chapple
It's not possible to eradicate the risk of DoS attacks, but there are steps infosec pros can take to reduce their impact. Mike Chapple shares ... Continue Reading
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ... Continue Reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.