DHS Looks To Boost Security Posture With Next Gen Capacities, Automation
Next-generation security and automation could provide DHS with the network security they need as the threat landscape becomes more aggressive and dangerous.

The SolarWinds and Log4j incidents have forced many federal agencies to search for new ways to safeguard their networks from a catastrophic cyberattack. The Department of Homeland Security is now eyeing next generation security and automation as means of better protecting its IT enterprises.
Shane Barney, CISO at USCIS, said he likes the next-generation security concept because it fosters a forward-looking rather than purely reactive approach to cybersecurity.
“NextGen is aimed at constantly pushing your security program to adapt and overcome whatever is coming at it. That constant state of change and flux really has to be driven. The modern cloud-based world we live in is unbelievably flexible and security programs have to adapt to that and move at that speed and scale,” Barney said during a Federal Insights Exchange panel.
Eric Sanders, CISO at DHS, said next-generation security also means finding ways to share information with those you don’t traditionally share with.
“It’s one thing to talk about sharing among our traditional partners, it’s another thing to share with those we don’t normally share with that puts us out of our comfort zone but helps us respond to events in a timelier fashion,” Sanders said. “Being able to work through an attack because we know they’re going to happen; we know they’re going to find software vulnerabilities faster than we can create patches for them, so we need to be able to respond in an automated fashion.”
DHS representatives have stated that automation is necessary for securing an enterprise with full cloud integration. The massive amount of data being created, and the scale and speed of it, is not something that protected manually.
“Automation is the critical crux of your entire operation — building proper feedback loops, making sure your automation is correct and doing what you want it to do, making sure that you’re always watching both sides of the fence,” Barney said.
“My priority is to automate our governance risk and compliance solutions and create a real time understanding of risks across the enterprise so we can start to automate the easier decisions as it relates to authorizations. If we can automate those and focus our person power on harder problems and gray areas, to me that would be a big win for us,” Sanders said.
During the event, Barney and Sanders also outlined ways agencies can improve their overall security posture.
Sanders believes that compliance can lead to better security posture, but that technical security is ultimately paramount.
“Assessing that security posture through aggressive adversarial simulations like pin testing and bug bounty programs to try and find those vulnerabilities,” Sanders said. “Inviting others in to assess your security posture especially from the outside will go a long way to ensuring that you’ve made the right decisions and that you’re secure enough.”
“Automate as much as possible about the known things in your environment and then focus as much as possible on the unknown threats,” Barney said. “Never be satisfied where your tool set sits. Stay a step ahead and stay up with the current threat environment as it shifts. Always altering the program, making updates and changing the way you do things is critical.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
The Next AI Wave Requires Stronger Cyber Defenses, Data Management
IT officials warn of new vulnerabilities posed by AI as agencies continue to leverage the tech to boost operational efficiency.
5m read -
Federal CIOs Push for ROI-Focused Modernization to Advance Mission Goals
CIOs focus on return on investment, data governance and application modernization to drive mission outcomes as agencies adopt new tech tools.
4m read -
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Marine Corps Operation StormBreaker Slashes Software Delivery Timelines by 17x
New program aims to deliver critical digital capabilities to warfighters at the "speed of relevance" by overhauling traditional processes.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
Modernization Strategies to Enable Energy Innovation
Lawrence Berkeley National Lab and Maximus experts explore the modernization strategies driving digital transformation and operational resilience within the energy sector.
33m watch -
DOE National Labs Launch New AI Tools for Operational Efficiency
The Energy Department's National Laboratories are using AI to increase operational efficiency and drive research efforts forward.
3m read -
Software Factories Accelerate Federal Modernization Outcomes
IT leaders from Nutanix and SAIC explain how software factories streamline tech development, modernize legacy systems and accelerate adoption of emerging technologies like AI.
34m watch -
AI in Top-Secret Clouds Is a ‘Game Changer’ for IC, DNI Says
Tulsi Gabbard touts significant improvements in AI, data analysis, interoperability and operational intelligence at the AWS Summit 2025.
3m read -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NIST’s Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch