CISA Looks at Partnerships, Data Protection Among 2020 Priorities
The new assistant director brings artificial intelligence background to the agency.

As “the nation’s risk advisor,” the Cybersecurity and Infrastructure Security Agency moves into its second full year with an eye on securing election systems before November, alongside its mission areas of protecting critical infrastructure, coordinating emergency response and defending the dot-gov domain from adversaries. 2020 also brings a new leader to the cybersecurity directorate: Assistant Director for Cybersecurity Bryan Ware.
In his first public appearance in his new role, Ware discussed the state of security and data policy for the Department of Homeland Security and outlined the priorities and key focus areas for CISA in 2020 and beyond.
Ware discussed CISA’s role in building interagency public-private partnerships in security, rather than mitigating risk through regulation.
“We don’t compel information sharing or vulnerability disclosures,” he said. “Those are activities that we encourage and we enable — really, to do that, it requires partnerships.”
Coming from the private sector before his previous role as the assistant secretary for cyber, infrastructure and resilience policy, Ware said that creating mutually beneficial partnerships is a goal for him going forward.
“When I say partnerships, I have to say that is not a word the government actually understands,” Ware explained. “We have to form partnerships that work for both sides of the partnership, so to speak. That’s really the culture we’re building at CISA — it’s a requirement we have to do the job that we’re called upon to do.”
Ware also predicted that the trend of CISA’s focus (and DHS’s focus, more broadly) on cybersecurity will continue in 2020.
“The critical infrastructure responsibilities that DHS has had since its formation have really morphed and evolved over time to be not just the physical risks that we used to be concerned about after 9/11, when DHS was formed, but now increasingly the cybersecurity risks to critical infrastructure,” Ware said. CISA’s cybersecurity directorate is moving to a focus on proactive threat hunting rather than reactive incident response and information sharing, he added.
When asked about “connecting data to security” Ware suggested flipping the topic, imagining security without data. It would be hard to gauge any policy or system’s effectiveness without the data, and as data becomes an even more crucial part of all IT systems, he called for “securing the data itself,” both at rest and in motion. It sounds like an easy proposition, and it is one that is commonly repeated throughout the security sector. As a newcomer, Ware added, he has a new “appreciation” for size of the challenge.
“Because of [the volume of data], it’s really hard to see things that are important,” Ware explained. “[Indicators of compromise] are increasingly having false positive rates, because as we’ve been able to collect and share indicators, our adversaries are changing their strategies and tactics.” CISA will have to step up its role sharing information, he said, in order to provide context to those indicators, which relies upon leveraging security data. In turn, that will require data to be accessible and verifiable.
Ware said he appreciated CISA’s adaptability in the past and looks forward to that same resiliency in the future.
“We think we know what we need five years from now,” he said. “But think about how many things, really, have changed in the last two years that we weren’t fully accounting for. Those programs … were designed like they were single-point solutions, and that target has moved significantly over the last few years. It creates an incredible pressure on the challenges of integrating data: how we move data from a silo for which it was designed into a place where it can be leveraged for new mission areas, [and] how we move across one specific vendor solution to multi-vendor solutions.”
Ware concluded by sharing some of the priorities CISA’s cybersecurity directorate has for 2020, including “embracing multi-cloud environments;” retiring legacy systems; “designing for scale [and] sharing,” which is especially difficult considering classification and privacy concerns; and “aligning across our mission areas,” to make the best use of past knowledge when combining it with emerging technologies like AI and machine learning.
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NIST’s Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read -
Rep. Gerry Connolly Leaves Lasting Mark on Federal Tech
Connolly's leadership in Congress significantly advanced government IT, emphasizing accountability, efficiency and a robust cybersecurity posture.
4m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read