DHS lays out new ‘cybersecurity readiness’ metrics for contractors – Federal News Network

Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The Department of Homeland Security will use a “cybersecurity readiness” assessment to evaluate whether contractors have appropriate cyber defenses in place prior to making contract awards.
DHS published the details of the new “cybersecurity readiness evaluation factor” in a Nov. 1 notice signed by Kenneth Bible, DHS’ chief information security officer, and Sarah Todd, DHS’ executive director of acquisition policy and legislation.
The notice confirms DHS’ plan to use its own approach for evaluating contractor cybersecurity rather than adopting the Defense Department’s Cybersecurity Maturity Model Certification (CMMC) program.
“It is the department’s intention to ensure that effective and appropriate cybersecurity measures are in place by vendors supporting work where such measures are necessary,” the DHS officials write in the new notice. “This new evaluation factor will enable DHS to evaluate vendors’ cybersecurity posture pre-award for applicable contracts to inform a best value tradeoff award decision.”
        As agencies begin to formalize their AI programs and look at where to scale up pilots and use cases, federal and industry leaders point to prioritizing based on outcomes. Learn insights from DHS, NSF and VA, as well as Pegasystems in our new ebook.
The notice doesn’t state when the new evaluation factor will go into effect. But DHS is seeking feedback on its plans by Nov. 17.
In an attachment to the notice, DHS lays out more details on how it will evaluate “cybersecurity readiness” based on analyzing contractor responses to a questionnaire.
In cases where the readiness factor is used in a solicitation, companies will need to show how they meet National Institute of Standards and Technology cybersecurity controls for protecting a broad category of sensitive government data known as “controlled unclassified information” or “CUI.”
Companies will be assigned ratings based on “readiness results” stemming from their responses to DHS’ “standardized secure assessment instrument questionnaire.” The ratings range from a “high likelihood of cyber readiness,” to just a “likelihood” of readiness, to a “low likelihood.”
The metrics “will be tailored to individual solicitations when utilized,” the DHS notice states. And importantly, a company’s cybersecurity rating could either help or hurt their bid.
“At the present time, this Cybersecurity Readiness Factor will only be used for best value tradeoff award decisions for applicable solicitations,” the attachment states. “However, solicitation language may require a Plan of Action and Milestones as a post-award deliverable if an awardee’s assessment result does not meet DHS’ expectations of compliance with the applicable clauses upon award.”
The new readiness tool planned by DHS builds off previous efforts to scrub the “cyber hygiene” of its industrial base through a self-assessment sent to 400 contractors last year.
During a webinar hosted by Leadership Connect last week, Bible said the cyber hygiene work is based around a priority at DHS to “use our contracting to raise the cybersecurity posture of our industry base.”
        Read more: Acquisition Policy
Even though DHS contractors need to follow the same cybersecurity standards as defense contractors, Bible has previously said DoD’s plan to require many contractors to obtain third-party cybersecurity assessments under CMMC was not the right fit for DHS.
Bible reiterated that stance during last week’s event, saying CMMC “wouldn’t really work with our industry base,” which includes a substantial number of small businesses. DoD has had to significantly revamp the CMMC program due to concerns about costing out small-and medium-sized businesses.
Bible said DHS can implement its cybersecurity evaluation mechanism without any rulemaking. DoD’s CMMC process remains in the rulemaking stage, with it unlikely to become effective until later next year.
“It’ll start helping us to go look at this in advance of a contract award,” Bible said. “We’re trying to take steps that we can do now. Let’s just start. And in my mind, that’s what starts to build the public’s confidence if they can just see the government moving out to do the things that we’re asking them to do. And we’re starting to hold ourselves to the same standards. I think that goes a long way. And are we going to hit the mark every time? Probably not. But the point is that if we don’t start, then we’re never going to get there.”
Copyright © 2023 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.
Follow @jdoubledayWFED
Need help accessing the FCC Public File due to a disability? Please contact Susan Rushkowski at publicfiledc@hubbardradio.com or (202) 895-5027.
Copyright 2023 Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.

source

Related Posts

After 6 months and little explanation, Norton Healthcare patients, employees still feeling effects of cyber attack – WDRB

Spotty shower possible. Storms after midnight Updated: April 16, 2024 @ 12:31 pmNorton Healthcare, a company serving about 600,000 patients a year with nearly $5 billion in assets, continues to…

Read more

CA's top cybersecurity job has been vacant for almost 2 years – CalMatters

Technology Californians get hacked all the time. The state’s top cybersecurity job is vacant In summaryGov. Newsom has yet to appoint a commander who is tasked with informing businesses and…

Read more

13 Cyber Security Measures Your Small Business Must Take – Tech.co

Our content is funded in part by commercial partnerships, at no extra cost to you and without impact to our editorial impartiality. Click to Learn MoreCybersecurity has been important to…

Read more

AVG Antivirus Free review – Ghacks

AVG AntiVirus Free is a longstanding security program for Microsoft Windows that protects computer systems from viruses, trojans and other malicious code.One interesting fact about AVG is that it maintains…

Read more

Vlog Episode #247: Chris Long on Improving Technical SEO Skills & Playing Offense SEO – Search Engine Roundtable

In part one, we learned about Chris Long and his experience working with Bill Slawski. Then, in part two, we spoke about helping people with SEO on LinkedIn and using…

Read more

Information Security Vs. Cybersecurity: What's The Difference? – Forbes

Information Security Vs. Cybersecurity: What’s The Difference?  Forbessource

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *