The departures have strained a workforce that was already stretched thin. âWe were running into [a] critical skills shortage previously,â says a second employee. âMost people are and have been doing the work of two or more full-time [staffers].â
The CISA team that helps critical infrastructure operators respond to hacks has been understaffed for years. The agency added support positions for that team after a Government Accountability Office audit, but âmost of those people got terminated,â a third employee says.
CISAâs flagship programs have been mostly unscathed so far. That includes the threat-hunting branch, which analyzes threats, searches government networks for intruders, and responds to breaches. But some of the laid-off staffers provided crucial âbackendâ support for threat hunters and other analysts. âThere’s enhancements that could be made to the tools that they’re using,â the first employee says. But with fewer people developing those improvements, âwe’re going to start having antiquated systems.â
In a statement, DHS spokesperson Tricia McLaughlin says CISA remains âcommitted to the safety and security of the nationâs critical infrastructureâ and touted âthe critical skills that CISA experts bring to the fight every day.â
National Security Council spokesperson James Hewitt says the reporting in this story is ânonsense,â adding that âthere have been no widespread layoffs at CISA and its mission remains fully intact.â
âWe continue to strengthen cybersecurity partnerships, advance AI and open-source security, and protect election integrity,â Hewitt says. âUnder President Trumpâs leadership, our administration will make significant strides in enhancing national cybersecurity.â
Partnership Problems
CISAâs external partnershipsâthe cornerstone of its effort to understand and counter evolving threatsâhave been especially hard-hit.
International travel has been frozen, two employees say, with tripsâand even online communications with foreign partnersârequiring high-level approvals. That has hampered CISAâs collaboration with other cyber agencies, including those of âFive Eyesâ allies Canada, Australia, New Zealand, and the UK, staffers say.
CISA employees canât even communicate with people at other federal agencies the way they used to. Previously routine conversations between CISA staffers and high-level officials elsewhere now need special permissions, slowing down important work. âI canât reach out to a CISO about an emergency situation without approval,â a fourth employee says.
Meanwhile, companies have expressed fears about sharing information with CISA and even using the agencyâs free attack-monitoring services due to DOGEâs ransacking of agency computers, according to two employees. âThere is advanced concern about all of our services that collect sensitive data,â the third employee says. âPartners [are] asking questions about what DOGE can get access to and expressing concern that their sensitive information is in their hands.â
âThe wrecking of preestablished relationships will be something that will have long-lasting effects,â the fourth employee says.
CISAâs Joint Cyber Defense Collaborative, a high-profile hub of government-industry cooperation, is also struggling. The JCDC currently works with more than 300 private companies to exchange threat information, draft defensive playbooks, discuss geopolitical challenges, and publish advisories. The unit wants to add hundreds more partners, but it has âhad difficulty scaling this,â the first employee says, and recent layoffs have only made things worse. Contractors might be able to help, but the JCDCâs âvendor support contracts run out in less than a year,â the employee says, and as processes across the government have been frozen or paused in recent weeks, CISA doesnât know if it can pursue new agreements. The JCDC doesn’t have enough federal workers to pick up the slack, the fourth CISA employee says.
+ There are no comments
Add yours