Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Biden-Harris American Rescue Plan includes more than $10b in cyber, IT funds

By Maria Henriquez
cyberinsurance
January 18, 2021

President-elect Joe Biden has announced the American Rescue Plan to "build a bridge towards economic recovery," during the coronavirus pandemic. the $1.9 trillion plan aims to create a national vaccination program to contain COVID-19 and safely reopen schools, deliver immediate relief to working families, and support communities that are struggling due to the virus. The American Rescue Plan also includes plans to modernize federal information technology to protect against future cyberattacks. 

"The recent cybersecurity breaches of federal government data systems underscore the importance and urgency of strengthening U.S. cybersecurity capabilities," says the plan, which will attempt to launch "the most ambitious" to modernize and secure federal IT and network by: 

  • Expanding and improving the Technology Modernization Fund. A $9 billion investment will help the U.S. launch major new IT and cybersecurity shared services at the Cybersecurity and Information Security Agency (CISA) and the General Services Administration and complete modernization projects at federal 18 agencies. In addition, the president-elect is calling on Congress to change the fund's reimbursement structure in order to fund more innovative and impactful projects.
  • Surging cybersecurity technology and engineering expert hiring. Providing the Information Technology Oversight and Reform fund with $200 million will allow for the rapid hiring of hundreds of experts to support the federal Chief Information Security Officer and U.S. Digital Service.
  • Building shared, secure services to drive transformational projects. Investing $300 million in no-year funding for Technology Transformation Services in the General Services Administration will drive secure IT projects forward without the need of reimbursement from agencies.
  • Improving security monitoring and incident response activities. An additional $690M for CISA will bolster cybersecurity across federal civilian networks, and support the piloting of new shared security and cloud computing services. 

“Seeing these initiatives included in relief plan is a good sign in itself and follows up on statements made earlier by the incoming team. Improvements are needed across all parts of the government’s IT in order to achieve that notion of cyber resilience as stated in the Solarium report. If it is enough to have a better coverage of experienced staff in all the branches of the Government is hard to tell as the funds reserved for that task are roughly covering 2,000 employees plus the needed personal equipment for one, perhaps two years," says Dirk Schrader, Global Vice President at New Net Technologies (NNT), a Naples, Florida-based provider of cybersecurity and compliance software. "Having the specific aspects of security monitoring and incident response as part of the investment plan should be designated also to automate things needed to do the core security stuff like change control and vulnerability scans which will detect the gaps in that resilient cyber security posture the new government aims to achieve.”

This significant investment in cybersecurity makes sense in the current landscape, which is rapidly evolving and having serious impacts on both public and private sector organizations, notes Hank Schless, Senior Manager, Security Solutions at Lookout, a San Francisco, Calif.-based provider of mobile security solutions. "The technology we use on a daily basis has evolved more quickly than many cybersecurity strategies. For that reason, securing infrastructure hasn’t been able to keep up. Both the public and private sector are relying heavily on smartphones and tablets to get work done away from their physical office spaces. With the emergence of cloud-based services that are easy to use on mobile devices, there’s now an expectation that anyone can work just as well from their smartphone or tablet as they can from their laptop. Even just a few years ago, mobile devices didn’t have anything close to the level of access to sensitive data that they do now. Threat actors know that mobile devices are an attractive target since they’re often used for both work and personal reasons. Even some federal agencies allow employees to use personal devices for work, which could introduce additional threats into their infrastructure."

Mobile phishing continues to be one of the most difficult issues for organizations, says Schless. "Historically, the only concern was phishing emails being sent to employees on laptops and desktops. But that’s changed. On mobile devices, attackers can execute phishing campaigns across countless channels, such as SMS, iMessage, WhatsApp, and social media platforms. To combat this, organizations need to ensure their training is up to date and that their anti-phishing solutions can accommodate these additional complexities."

Schless adds that the $200 million allocated for hiring experts to support the federal Chief Information Security Officer and U.S. Digital Service could definitely attract new talent into the public sector. "However, looking at it more broadly, the funding allocated to other agencies may be used to contract more with private sector companies. This public-private partnership approach could be more efficient if these agencies want to get modern solutions in place with the oversight of experts rather than trying to build the solutions themselves.”

According to Joseph Neumann, Director, Offensive Security at Coalfire, a Westminster, Colorado-based provider of cybersecurity advisory services, the Department of Homeland Security, specifically [the Cybersecurity and Information Security Agency] was one of the only groups that started differential pay to offset compensation to make it possibly competitive.

Neumann adds, "The revolving door will continue to go the other direction as Private sector looks at and identifies real world experience more than any formal education due to the ability to apply vs hypotheticals. Once individuals get enough real world experience they quickly jump to contractor or private sector positions that are more lucrative and faster paced. Other differentiators to look at are recruiting avenues, work-life balances, remote work, and nice office settings. Government work, a majority of it the time, requires individuals to be in the office setting every day and does not allow for remote work. Free snacks, better equipment, and nicer offices are a norm in the commercial world vs the standard cube-land of government offices. People get tours of Google and Amazon offices and are wow’d. Lastly, agility on all fronts, from promotion opportunities, to general job functions. Promotions require you to find a new job and rarely have different work responsibility that the security workforce craves.”

KEYWORDS: cyber security hackers risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Another key piece of creating a safe environment at airports is proper screening of employees and contractors to reduce the chance of an insider threat

    Virginia Airports to Receive More Than $13 Million in Funds

    See More
  • Survey says enterprises will invest in smart building technology and integrated security systems amid COVID-19 pandemic

    More than 50% of organizations plan to increase investment in building technology to protect health & safety of occupants

    See More
  • cyber-attack

    More than 8.4 million DDoS Attacks Targeted IT Infrastructures, Cloud, Mobile Networks & IoT Devices in 2019

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • November 20, 2024

    Digital Forensics in Your Incident Response Plan

    ON DEMAND: Organizations face increasingly sophisticated threats that can compromise data and disrupt business operations. This presentation will explore the role that digital forensics plays in an effective incident response plan using NIST and CISA playbooks as guides.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing