recommended reading

Federal Information Systems Hit 20 Years on GAO’s High-Risk List

Cienpies Design/Shutterstock.com

The Government Accountability Office released an updated high-risk list of programs ripe for waste or mismanagement, and again, for the 20th year, it features federal information systems security.

“Securing these technologies is vital for the nation’s security, prosperity and well-being. Nevertheless, the security over these systems is inconsistent and additional actions are needed to address ongoing cybersecurity and privacy challenges,” GAO Information Security Issues Director Gregory Wilshusen told the House Science, Space and Technology’s research and technology subcommittee Tuesday.

» Get the best federal technology news and ideas delivered right to your inbox. Sign up here.

GAO released the 2017 high-risk list Wednesday and it highlights 34 areas of concern, including several technology-focused programs. The 2020 Census, for example, made the list this year for the first time because escalating costs and persistent issues with IT acquisition and implementation. The office has tracked the potential gap in weather data from satellites since 2013, with the National Oceanic and Atmospheric Administration making significant progress with its satellites while the Defense Department’s share still needs significant attention.

The watchdog also recommended signification attention be paid to federal information systems security. Over the years, GAO expanded the area to include critical cyber infrastructure and protecting personally identifiable information. In that time, the office also made 2,500 recommendations to agencies, with 1,000 yet to be implemented as of January.

“Many agencies continue to be challenged in safeguarding their computer systems and information in part because many of these recommendations have not been implemented,” Wilshusen said.

So why aren’t agencies taking up the recommendations?

Some recommendations simply take a long time to implement, Wilshusen told the subcommittee. Other times, agencies address issues in some systems but not all. GAO also found agency security tests and processes rely more on interviews than digging into systems to verify or correct configurations.

“Another factor is that agencies will often close out a recommendation as implemented when they come up with a plan to implement and not necessarily take the action needed to across the enterprise,” he said.

GAO’s goal is to not have a high-risk list at all, but until then, the office measure areas against five criteria: leadership commitment, capacity, action plan, monitoring and demonstrated progress. This year, only one area—sharing and managing terrorism-related information—improved enough to be removed from the list.

Threatwatch Alert

Stolen laptop

3.7M Hong Kong Voters' Personal Data Stolen

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.