In the recent Security Innovation Network (SINET) event locked in Washington D.C lately a sober assessment in our nation’s ability to maintain an sufficient cyber defense emerged.

The condition in our cyber defense was summarized by Michael Chertoff, former Secretary from the Department of Homeland Security as he concluded that it could take “an electronic 9-11” to obtain business, consumers and governments to fortify their cyber security defenses. Essentially we’re fighting an asymmetrical war and, at the moment, we seem to be losing.

Echoing this theme, Mr. Vivek Wadhwa, a top cyber security analyst, argues, “Government simply can’t innovate quick enough to help keep pace using the threats and dynamics from the Internet or Plastic Valley’s quickly altering technologies.”

Wadhwa procedes to explain that innovative entrepreneurial technology advancements are essential however the government, correctly overwhelming dependencies on large contractors, isn’t outfitted to benefit from new and effective cyber defense technology.

Wadhwa concludes that true innovation developed through smaller sized entrepreneurial firms has been stifled by Authorities procurement practices.

The Us Government Acquisition Technique is Insufficient:

Although Wadhwa’s argument is centered on technology development only additionally, it applies equally to providers who adapt new technology to new and improving defensive tactics for example vulnerability assessment, analysis of threats and remedial action.

Since effective defense against cyber attacks is definitely an ongoing procedure for monitoring and taking coercive action, the function of services and also the cyber warrior can also be critical and outdated Federal buying patterns are equally dangerous.

A lot of the issue comes from the current buying and acquisition patterns from the government. For a long time the government has chosen over bundle needs directly into large “omnibus” or IDIQ contracts (with negotiated task orders) that favor the biggest contractors but stifle innovation and versatility. Cyber security needs are treated on the like basis with It needs which is an error.

Additionally, recent Congressional contracting “reforms” have encouraged protest actions on new contracts and task orders for new and existing contracts, producing a significant delay from the procurement process. Within the fast evolving realm of cyber security, delayed deployment of frequently obsolete technology solutions increases the chance of a effective attack.

Since these contracts are very large, they might require many amounts of approval-usually by Congress or senior administration officials. It often takes 3-four years for government to award these and effective bidders frequently need to go via a grueling “certification” tactic to get approval to bid. Proposal efforts for big bundled contracts cost huge amount of money to organize and also to lobby government officials and political leaders to be able to win.