• Research
  • About
  • Experts
Carnegie India logoCarnegie lettermark logo
AI
{
  "authors": [
    "Katherine Charlet"
  ],
  "type": "other",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [
    "Cyber and Digital Policy"
  ],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "TIA",
  "programs": [
    "Technology and International Affairs"
  ],
  "projects": [],
  "regions": [
    "North America",
    "United States",
    "Iran"
  ],
  "topics": [
    "Security",
    "Technology"
  ]
}

Source: Getty

Other

Understanding Federal Cybersecurity

Federal cybersecurity will be an enduring mission, always evolving and changing to stay ahead of the threat.

Link Copied
By Katherine Charlet
Published on Apr 1, 2018

Source: Belfer Center for Science and International Affairs

Federal networks are attractive targets for foreign intelligence services and other malicious actors in cyberspace. Networks serving over 100 agencies and millions of employees enable government missions and operations, handle sensitive internal communications, and store personal data on millions of Americans. The level of threat faced by federal government networks has few parallels, and agencies have been unable to keep up.

Federal cybersecurity is a dense, inaccessible topic to those outside the information security community and even to some inside it. Information is scattered across a variety of government documents, with no “one stop shop” to understand the topic. This report fills the gap by:

  • Characterizing the federal cybersecurity landscape, to include describing roles and responsibilities of various federal agencies and identifying systemic challenges.
  • Summarizing recent federal drives to improve it, such as through information technology modernization, identification of high value assets, using shared services and commercial technologies, detecting and blocking threats, identifying and fixing risk factors, and improving incident response.
  • Reviewing efforts to improve the foundations of federal cybersecurity by enhancing the cyber workforce, research and development efforts, acquisition, and leadership.

Securing federal civilian networks and systems is a complex and daunting prospect. Several systemic factors contribute to a challenging environment:

  1. Difficult tradeoffs between centralized and decentralized management. The overall federal structure is largely decentralized, with each agency managing its own risk, and implementing its own security solutions. Full centralization would bring its own challenges, such as limiting agencies’ ability to develop tailored, agile solutions to their cybersecurity challenges.
  2. Varying levels of engagement of agency top leadership on cyber risk management. Successful agency heads develop an awareness of cyber risk and actively manage it. Within agencies, the authorities of chief information officers vary widely.
  3. Varying effectiveness of levers to direct, incentivize, and enforce action by nonperforming federal agencies. The Department of Homeland Security and Office of Management and Budget have some levers to drive action by individual agencies, and DHS’ increasing operational authority has been critical.
  4. Resource constraints and a rigid government budgeting cycle. Properly resourcing cybersecurity priorities can be expensive, and the structure of the government budgeting process poses challenges for agency cybersecurity efforts.
  5. Scattered congressional oversight. No single congressional body has the full picture of federal cybersecurity measures, and legislative requirements are spread across many bills, making it complicated for federal agencies to adapt to threats.

In developing approaches to better manage cyber risk to federal government systems, policymakers, agency leaders, cybersecurity professionals, and congressional staff should consider the following themes:

  • Sound risk management underpins all federal cybersecurity efforts. Federal agencies cannot and will not prevent every incident or intrusion. Agencies must identify the most important missions and assets, then craft strategies to reduce, mitigate, or accept the risks.
  • Sustained, high-level leadership from agency heads is critical to success. Agencies with engaged department heads or deputies are much more likely to use resources strategically, force mission or business owners to attend to cybersecurity, and empower chief information officers to take steps needed to protect systems and enforce standards.
  • Effective management demands clarity on roles and responsibilities. The federal cybersecurity system is complex. This is not inherently bad but it does demand constant effort to refine, clarify, and institutionalize roles and responsibilities to ensure coherence.
  • Steady, incremental progress makes a difference. The Cyber Sprint in 2016, modest as it was, demonstrated that agencies can make progress when held accountable for discrete milestones, especially on issues of basic cyber hygiene often exploited by intruders.
  • Some areas, however, require constant innovation, or even a fundamental “rethink.” The most advanced agencies have policies that reward and implement innovative ideas on topics like workforce, procurement, and executive education.
  • Congress plays a critical role. Congress authorizes and appropriates agency missions, authorities, and budgets. Very little can be done without strong support and engagement from the legislative branch.
  • Resources matter. Skimping on resources for modernizing networks or attracting cybersecurity talent will reduce the ability of agencies to secure their core missions, with real impacts to both government and citizens.
  • Evolving technology will change the game. Innovation in the digital ecosystem, like automation, will bring both new threats and new defensive applications. The government will need to plan 5- to 10-years ahead to keep from lagging behind.

There are no silver bullets for federal cybersecurity. The system will retain its inherent complexity, necessitating close coordination and partnership. Federal cybersecurity will be an enduring mission, always evolving and changing to stay ahead of the threat. In other words, there is no “finish line”—only continual improvement, adaptation, and cooperation to secure the federal government and those it serves.

Read Full Text

This report was originally published by the Belfer Center.

About the Author

Katherine Charlet

Former Director, Technology and International Affairs Program

Katherine Charlet was the inaugural director of Carnegie’s Technology and International Affairs Program.

    Recent Work

  • Commentary
    Campaigns Must Prepare for Deepfakes: This Is What Their Plan Should Look Like

      Katherine Charlet, Danielle Citron

  • Article
    What the Machine Learning Value Chain Means for Geopolitics
      • +3

      Charlotte Stanton, Vivien Lung, Nancy (Hanzhuo) Zhang, …

Katherine Charlet
Former Director, Technology and International Affairs Program
SecurityTechnologyNorth AmericaUnited StatesIran

Carnegie India does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie India

  • Article
    What Could a Reciprocal Defense Procurement Agreement Do for U.S.-India Ties?

    India and the United States are close to concluding a Reciprocal Defense Procurement Agreement (RDPA) that will allow firms from the two countries to sell to each other’s defense establishments more easily. While this may not remedy the specific grievances both sides may have regarding larger bilateral issues, an RDPA could restore some momentum, following the trade deal announcement.

      Konark Bhandari

  • Commentary
    India Signs the Pax Silica—A Counter to Pax Sinica?

    On the last day of the India AI Impact Summit, India signed Pax Silica, a U.S.-led declaration seemingly focused on semiconductors. While India’s accession to the same was not entirely unforeseen, becoming a signatory nation this quickly was not on the cards either.

      Konark Bhandari

  • Commentary
    The PSLV Setback: Restoring India’s Workhorse

    On January 12, 2026, India's "workhorse," the Polar Satellite Launch Vehicle, experienced a consecutive mission failure for the first time in its history. This commentary explores the implications of this incident on India’s space sector and how India can effectively address issues stemming from the incident.

      Tejas Bharadwaj

  • Commentary
    AI Adoption Journey for Population Scale

    Connecting real-world AI use cases across sectors such as health, education, agriculture, and livelihoods can help policymakers, innovators, and institutions align around a shared goal. This article looks at a framework ensuring that AI works for everyone.

      Shalini Kapoor, Tanvi Lall

  • Commentary
    The Impact of U.S. Sanctions and Tariffs on India’s Russian Oil Imports

    This piece examines India’s response to U.S. sanctions and tariffs, specifically assessing the immediate market consequences, such as alterations in import costs, and the broader strategic implications for India’s energy security and foreign policy orientation.

      Vrinda Sahai

Get more news and analysis from
Carnegie India
Carnegie India logo, white
Unit C-4, 5, 6, EdenparkShaheed Jeet Singh MargNew Delhi – 110016, IndiaPhone: 011-40078687
  • Research
  • About
  • Experts
  • Projects
  • Events
  • Contact
  • Careers
  • Privacy
  • For Media
Get more news and analysis from
Carnegie India
© 2026 Carnegie Endowment for International Peace. All rights reserved.