The Cybersecurity and Information Assurance (CSIA) Interagency Working Group (IWG) coordinates Federal R&D to protect information and information systems from cyber threats. This R&D supports the security and safety of U.S. information systems that underpin a vast array of capabilities and technologies in many sectors, including power generation, transportation, finance, healthcare, manufacturing, and national security. The CSIA IWG reports investments to the Cyber Security and Privacy (CSP) Program Component Area.
Overview
The CSIA Interagency Working Group (IWG) was created in 2006 to coordinate Federal cybersecurity R&D across 16 participating agencies and support their research activities to protect U.S. information and information systems from cyber threats. Guided by the Federal Cybersecurity Research and Development Strategic Plan and aligned with NIST’s Framework for Improving Critical Infrastructure Cybersecurity, the IWG focuses on the safety and security of systems that underpin a vast array of capabilities and technologies in multiple sectors, including power generation, transportation, finance, healthcare, manufacturing, and national security.
Strategic Priorities
- Cybersecurity Through Human-centered Approaches: Develop capabilities to effectively incorporate human and societal values, needs, and abilities into the design, development, operation, and evaluation of information systems and cybersecurity solutions.
- Empower Organizations to Tackle Cybersecurity Threats: Develop methods, techniques to understand, analyze, and manage cyber security, cyber resilience, and privacy risks. Advance methods and techniques to understand how markets, liabilities, incentives, insurance, and regulation could ensure better cyber security and cyber resilience outcomes.
- Cybersecurity Education and Workforce Development: Advance programs in cybersecurity education, training, professional development, and public awareness. Develop capabilities to improve the productivity of the cybersecurity workforce.
- Establish and Negotiate Trust: Develop capabilities to establish, enforce, and verify the desired level of trust at all layers of computing (e.g., hardware, operating systems, applications, networking, information exchanges). Develop capabilities to establish and ensure trust for identity, access, and interoperation.
- Cyber Resilience by Design: Develop methods and approaches for designing, developing, and validating systems that can withstand and recover from cyberattacks and continue to deliver vital functions even when compromised. Advance science and engineering of cyber resilience.
- Deter: Develop capabilities to efficiently discourage malicious cyber activities by increasing costs, diminishing the spoils of, and increasing risks and uncertainty for potential adversaries.
- Protect: Develop technologies to limit system vulnerabilities through design, construction, and verification, where components, systems, users, and critical infrastructure can efficiently resist malicious cyber activities, and can ensure confidentiality, integrity, availability, and accountability.
- Detect: Develop technologies to ensure that system owners and users have situational awareness and understanding of ongoing activities and can reliably detect malicious cyber activities.
- Respond: Develop technologies to provide real-time assessments of system anomalies, provide adaptive response to disruptions, sustain critical functions, and enable automated recovery.
- Protect Software and Hardware Supply Chain: Develop capabilities to attest to Software and Hardware supply chain integrity through design and development, and to verify and maintain ongoing supply chain integrity throughout operations.
- Realize Secure and Trustworthy Artificial Intelligence: Develop capabilities to realize AI that is verifiably safe, secure, and resilient. Provide capabilities that improve trusted collaboration between humans and AI.
- Secure Clean Energy Future: Develop capabilities to ensure that clean energy technologies and systems are inherently secure and resilient to cyber or cyber-physical threats.
Co-Chairs
Matthew Scholl Division Chief Computer Security, Information Technology Lab (ITL) National Institute of Standards and Technology (NIST) |
Cliff Wang Program Director Computer and Network Systems (CISE/CNS) U.S. National Science Foundation |
Technical Coordinator
Tomas Vagoun |
Activities
- Helping to develop the 5G R&D Implementation Plan in response to the Secure 5G and Beyond Act of 2020.
Publications
- Federal Cybersecurity Research and Development Strategic Plan (2023). CSIA IWG, NITRD Subcommittee, NSTC. December 31, 2023.
- FY2021 Federal Cybersecurity R&D Strategic Plan Implementation Roadmap. CSIA IWG, NITRD Subcommittee, NSTC. August 14, 2020.
- Artificial Intelligence and Cybersecurity: Opportunities and Challenges: Technical Workshop Summary Report. NITRD Subcommittee, Machine Learning and Artificial Intelligence (MLAI) Subcommittee; National Science and Technology Council (NSTC). March 2020.
- Federal Cybersecurity Research and Development Strategic Plan. CSIA IWG, NITRD Subcommittee, NSTC. December 2019.
- FY2020 Federal Cybersecurity R&D Strategic Plan Implementation Roadmap. CSIA IWG, NITRD Subcommittee, NSTC. September 2019.
- FY2019 Federal Cybersecurity R&D Strategic Plan Implementation Roadmap. CSIA IWG, NITRD, NSTC. August 2018.
Resources and References
- Federal Register Notice: 88 FR 10552, “Request for Information on the 2023 Federal Cybersecurity Research and Development Strategic Plan”, February 21, 2023. Public Responses March 14, 2023.
- National Cyber Strategy of the United States of America, The White House, September 2018.
- Federal Cybersecurity Research and Development Strategic Plan, NITRD, NSTC, February 2016.
- Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, The White House, NSTC, December 2011.