• Commentary
  • Research
  • Experts
  • Events
Carnegie China logoCarnegie lettermark logo
{
  "authors": [
    "Katherine Charlet"
  ],
  "type": "other",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [
    "Cyber and Digital Policy"
  ],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "TIA",
  "programs": [
    "Technology and International Affairs"
  ],
  "projects": [],
  "regions": [
    "North America",
    "United States",
    "Iran"
  ],
  "topics": [
    "Security",
    "Technology"
  ]
}

Source: Getty

Other

Understanding Federal Cybersecurity

Federal cybersecurity will be an enduring mission, always evolving and changing to stay ahead of the threat.

Link Copied
By Katherine Charlet
Published on Apr 1, 2018

Source: Belfer Center for Science and International Affairs

Federal networks are attractive targets for foreign intelligence services and other malicious actors in cyberspace. Networks serving over 100 agencies and millions of employees enable government missions and operations, handle sensitive internal communications, and store personal data on millions of Americans. The level of threat faced by federal government networks has few parallels, and agencies have been unable to keep up.

Federal cybersecurity is a dense, inaccessible topic to those outside the information security community and even to some inside it. Information is scattered across a variety of government documents, with no “one stop shop” to understand the topic. This report fills the gap by:

  • Characterizing the federal cybersecurity landscape, to include describing roles and responsibilities of various federal agencies and identifying systemic challenges.
  • Summarizing recent federal drives to improve it, such as through information technology modernization, identification of high value assets, using shared services and commercial technologies, detecting and blocking threats, identifying and fixing risk factors, and improving incident response.
  • Reviewing efforts to improve the foundations of federal cybersecurity by enhancing the cyber workforce, research and development efforts, acquisition, and leadership.

Securing federal civilian networks and systems is a complex and daunting prospect. Several systemic factors contribute to a challenging environment:

  1. Difficult tradeoffs between centralized and decentralized management. The overall federal structure is largely decentralized, with each agency managing its own risk, and implementing its own security solutions. Full centralization would bring its own challenges, such as limiting agencies’ ability to develop tailored, agile solutions to their cybersecurity challenges.
  2. Varying levels of engagement of agency top leadership on cyber risk management. Successful agency heads develop an awareness of cyber risk and actively manage it. Within agencies, the authorities of chief information officers vary widely.
  3. Varying effectiveness of levers to direct, incentivize, and enforce action by nonperforming federal agencies. The Department of Homeland Security and Office of Management and Budget have some levers to drive action by individual agencies, and DHS’ increasing operational authority has been critical.
  4. Resource constraints and a rigid government budgeting cycle. Properly resourcing cybersecurity priorities can be expensive, and the structure of the government budgeting process poses challenges for agency cybersecurity efforts.
  5. Scattered congressional oversight. No single congressional body has the full picture of federal cybersecurity measures, and legislative requirements are spread across many bills, making it complicated for federal agencies to adapt to threats.

In developing approaches to better manage cyber risk to federal government systems, policymakers, agency leaders, cybersecurity professionals, and congressional staff should consider the following themes:

  • Sound risk management underpins all federal cybersecurity efforts. Federal agencies cannot and will not prevent every incident or intrusion. Agencies must identify the most important missions and assets, then craft strategies to reduce, mitigate, or accept the risks.
  • Sustained, high-level leadership from agency heads is critical to success. Agencies with engaged department heads or deputies are much more likely to use resources strategically, force mission or business owners to attend to cybersecurity, and empower chief information officers to take steps needed to protect systems and enforce standards.
  • Effective management demands clarity on roles and responsibilities. The federal cybersecurity system is complex. This is not inherently bad but it does demand constant effort to refine, clarify, and institutionalize roles and responsibilities to ensure coherence.
  • Steady, incremental progress makes a difference. The Cyber Sprint in 2016, modest as it was, demonstrated that agencies can make progress when held accountable for discrete milestones, especially on issues of basic cyber hygiene often exploited by intruders.
  • Some areas, however, require constant innovation, or even a fundamental “rethink.” The most advanced agencies have policies that reward and implement innovative ideas on topics like workforce, procurement, and executive education.
  • Congress plays a critical role. Congress authorizes and appropriates agency missions, authorities, and budgets. Very little can be done without strong support and engagement from the legislative branch.
  • Resources matter. Skimping on resources for modernizing networks or attracting cybersecurity talent will reduce the ability of agencies to secure their core missions, with real impacts to both government and citizens.
  • Evolving technology will change the game. Innovation in the digital ecosystem, like automation, will bring both new threats and new defensive applications. The government will need to plan 5- to 10-years ahead to keep from lagging behind.

There are no silver bullets for federal cybersecurity. The system will retain its inherent complexity, necessitating close coordination and partnership. Federal cybersecurity will be an enduring mission, always evolving and changing to stay ahead of the threat. In other words, there is no “finish line”—only continual improvement, adaptation, and cooperation to secure the federal government and those it serves.

Read Full Text

This report was originally published by the Belfer Center.

About the Author

Katherine Charlet

Former Director, Technology and International Affairs Program

Katherine Charlet was the inaugural director of Carnegie’s Technology and International Affairs Program.

    Recent Work

  • Commentary
    Campaigns Must Prepare for Deepfakes: This Is What Their Plan Should Look Like

      Katherine Charlet, Danielle Citron

  • Article
    What the Machine Learning Value Chain Means for Geopolitics
      • +3

      Charlotte Stanton, Vivien Lung, Nancy (Hanzhuo) Zhang, …

Katherine Charlet
Former Director, Technology and International Affairs Program
SecurityTechnologyNorth AmericaUnited StatesIran

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie China

  • Commentary
    China’s Energy Security Doesn’t Run Through Hormuz but Through the Electrification of Everything

    Across Asia, China is better positioned to withstand energy shocks from the fallout of the Iran war. Its abundant coal capacity can ensure stability in the near term. Yet at the same time, the country’s energy transition away from coal will make it even less vulnerable during the next shock.


      • Damien Ma

      Damien Ma

  • Xi walking into a room with people standing and applauding around him
    Commentary
    Emissary
    The Xi Doctrine Zeros in on “High-Quality Development” for China’s Economic Future

    In the latest Five-Year Plan, the Chinese president cements the shift to an innovation-driven economy over a consumption-driven one.

      • Damien Ma

      Damien Ma

  • Commentary
    When It Comes to Superpower Geopolitics, Malaysia Is Staunchly Nonpartisan

    For Malaysia, the conjunction that works is “and” not “or” when it comes to the United States and China.

      Elina Noor

  • Commentary
    ASEAN-China Digital Cooperation: Deeper but Clear-Eyed Engagement

    ASEAN needs to determine how to balance perpetuating the benefits of technology cooperation with China while mitigating the risks of getting caught in the crosshairs of U.S.-China gamesmanship.

      Elina Noor

  • Commentary
    Today’s Rare Earths Conflict Echoes the 1973 Oil Crisis — But It’s Not the Same

    Regulation, not embargo, allows Beijing to shape how other countries and firms adapt to its terms.

      Alvin Camba

Get more news and analysis from
Carnegie China
Carnegie China logo, white
Keck Seng Tower133 Cecil Street #10-01ASingapore, 069535Phone: +65 9650 7648
  • Research
  • About
  • Experts
  • Events
  • Contact
  • Careers
  • Privacy
  • For Media
Get more news and analysis from
Carnegie China
© 2026 Carnegie Endowment for International Peace. All rights reserved.