Heather Kuldell | Nextgov | October 5, 2016 | 0 Comments

Why the Government Needs Cyber Translators

Alexander Supertramp/Shutterstock.com

Cybersecurity professionals will need more than their technical abilities to tackle government challenges, according to two agency IT security officials.

Jeanette Hanna-Ruiz, NASA’s associate chief information officer for IT security and senior agency information security official, sees her role as helping agency employees understand why her team does certain things, like swap an employee’s Mac for PC.

“Our challenge going forward is to talk to our peers at these organizations who don’t necessarily know about security,” she said Tuesday at Fedstival’s The Next Tech event hosted by Government Executive and Nextgov. “I want to speak to them in a language they understand.”

» Get the best federal technology news and ideas delivered right to your inbox. Sign up here.

Translating cyber speak also is a priority for Office of Personnel Management Chief Information Security Officer Cord Chase. He has weekly meetings with agency leadership and other CXOs to keep them on the same page when it comes to risks and initiatives.

One of Chase’s challenges since starting his position four months ago has been shutting down shadow IT, the devices, processes and workarounds employees use that the agency never authorized. He said it took a while to convince people he wanted to protect them, not necessarily shut them down.

CISOs should worry about security, but other employees need to be able to focus on doing their jobs, Hanna-Ruiz said.

“We need to automate security so it’s the white noise of their life,” she said. “We need to have empathy and compassion about that.”

Such “cyber translation” skills aren't just for talking to internal employees. Agencies need people such as lawyers, communications professionals and procurement specialists for less technical, cyber-related roles. For example, Hanna-Ruiz said the government needs “a procurement brain married with a cyber brain” to help agencies address supply-chain concerns.

“In order to come and work at OPM, you not only need to have an operational background; you need a governance background,” Chase said.

Comments
JOIN THE DISCUSSION

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.