{"id":3695,"date":"2019-03-13T16:05:30","date_gmt":"2019-03-13T19:05:30","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=3695"},"modified":"2019-03-13T16:05:30","modified_gmt":"2019-03-13T19:05:30","slug":"el-pentagono-usa-considera-certificar-en-ciberseguridad-a-sus-contratistas","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=3695","title":{"rendered":"El Pent\u00e1gono (USA) considera certificar en ciberseguridad a sus contratistas"},"content":{"rendered":"<p>A\u00fan no est\u00e1 claro qu\u00e9 se requerir\u00eda para la certificaci\u00f3n o cu\u00e1nto costar\u00eda para las empresas.<!--more--><\/p>\n<p class=\"drop-cap\"><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/cdn.nextgov.com\/media\/img\/upload\/2018\/12\/06\/120618cyberbadgeNG\/860x394.jpg\" alt=\"\" width=\"441\" height=\"202\" \/>In cybersecurity, you\u2019re only as strong as your weakest link. For the Defense Department, the area with the fewest cyber protections are the defense contractors the department works with, particularly the small businesses that don\u2019t have the expertise or resources to build a robust security posture.<\/p>\n<p>The Pentagon put together a task force to assess whether small businesses within the defense industrial base are complying with the cybersecurity framework published by the National Institute of Standards and Technology and provide assistance to companies that need help.<\/p>\n<p>The department issued a new rule last year requiring vendors to show that they are in compliance with NIST standards or have a plan to get there quickly.\u00a0<a href=\"https:\/\/www.defenseone.com\/business\/2017\/12\/pentagon-delays-deadline-military-suppliers-meet-cybersecurity-rules\/144549\/\" target=\"_blank\" rel=\"noopener noreferrer\">Those plans were due Jan. 1<\/a>.<\/p>\n<p>\u201cWhere are we in actually implementing the NIST standard? Is it working? I would argue right now it\u2019s not. We basically say, \u2018Hey, tell us if you\u2019re compliant.\u2019 And we don\u2019t actually check,\u201d Kevin Fahey, assistant secretary of defense for acquisition, said during a keynote at the annual Charleston Defense Contractors Association Summit in South Carolina.<\/p>\n<p>Within the next year, Fahey said he hopes to have a method to certify cybersecurity of Defense Department vendors. That process begins with ensuring companies are compliant with NIST standards.<\/p>\n<p>\u201cThat will be the first step, which is a huge step,\u201d he said. \u201cThen, how do we change the NIST to maybe be even more encompassing to make sure we\u2019re doing things?\u201d<\/p>\n<p>Fahey acknowledged that second step might be cause for concern among the defense industrial base, as it is not yet clear exactly what that would mean or, more importantly, how much it would cost. As a remedy, he cited upcoming pilots to allow small businesses to use the department\u2019s secure environments, putting the cost and security onus on the government rather than the contractor.<\/p>\n<p>\u201cIs there a way that we certify industry to be cyber-compliant to protect our data?\u201d Fahey asked. \u201cWe need to figure it out and we need to figure it out fast.\u201d<\/p>\n<p>Fuente: <em><a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2018\/12\/pentagon-considers-cybersecurity-certification-its-contractors\/153330\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.nextgov.com<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A\u00fan no est\u00e1 claro qu\u00e9 se requerir\u00eda para la certificaci\u00f3n o cu\u00e1nto costar\u00eda para las empresas.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/3695"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3695"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/3695\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}