New DHS CIO Tackles Supply Chain Risk Management, Interoperability
Eric Hysen brings his experience at USCIS to a reimagined office focused on cybersecurity and data management.

The Department of Homeland Security is in the process of setting up a supply chain risk management office to report to the chief information security officer, DHS CIO Eric Hysen told GovernmentCIO Media & Research.
The move comes in direct response to the SolarWinds software supply chain breach in December 2020, which affected critical infrastructure and numerous federal agencies and brought IT supply chain risks came to the forefront of the national cyber conversation.
Cybersecurity is his โfirst and foremostโ priority as CIO, Hysen said, and the new supply chain risk management office is โin the worksโ with a team working on โpiloting efforts.โ
Some potential priorities of the new office could be to incorporate a โsoftware bill of materialsโ to keep track of every single piece of software in a supply chain. The idea of an SBOM is gaining traction in federal IT and cybersecurity conversations.
An SBOM is especially attractive to DHS, Hysen said, because โthere are not a lot of standardsโ for critically assessing software vendors.
โAs we look at specifically addressing the SolarWinds breach, weโre looking at better evaluating the security of off-the-shelf software and using on our network or giving access to our data,โ Hysen told GovernmentCIO Media & Research. โThis is a relatively new area and one weโre looking to be an aggressive early adopter in.โ
Hysen is also interested in a DHS-tailored version of the Defense Departmentโs Cybersecurity Maturity Model Certification standards, but wants to be mindful of the effect these types of standards could have on small, minority-owned, and women-owned businesses, some of which he said have some of the most innovative and modern cybersecurity practices.
โWeโre looking at what DOD has been doing with CMMC and looking at different ways to pilot similar efforts at DHS to better assess the cybersecurity practices of our vendors,โ he said. โWe have some elements in our Homeland Security Acquisition Regulations that may look a little different from DOD, but weโre really mindful of one not putting undue burden on our vendors. If it becomes too difficult to work with DHS, weโre going to lose really innovative or small and minority- and women-owned businesses.โ
One of the first initiatives Hysen launched when he assumed the CIO role in February was the Zero Trust Action Group to share best practices for implementing a zero trust approach to cybersecurity across DHS components.
โThankfully zero trust is something DHS has been working on for quite a while โฆ itโs a fundamental rethinking of our approach to cybersecurity,โ Hysen said. โWeโre moving from this outdated criminal defense model where if we have the right defenses at the edge of our network, we donโt have to be concerned about what goes on inside. We consistently see from sophisticated breaches thatโs not how our adversaries work.โ
Hysen noted some of the early work in this regard has been to stand up cloud access security technologies and gateway systems for remote employees.
President Joe Bidenโs Executive Order on Improving the Nationโs Cybersecurity โturbochargedโ zero trust efforts at DHS, Hysen added.
โThe [executive order] is incredibly exciting, probably the most comprehensive reimagining of federal security and IT ever,โ he said. โIn the areas of zero trust, itโs work weโve already been doing. One deliverable due this week is our 60-day report on some items including our zero trust action plan across the department. Thankfully these are things weโve already been doing. The [order] has been a strong signal of priority for this work.โ
Although cybersecurity is โfirst and foremostโ among Hysenโs CIO priorities, data interoperability between components across the department is also important. A few months ago, Hysen stood up a new data operations office to support this effort.
โWe made some good progress in standing up a dedicated office under my office [for data],โ he said. โWhile itโs something we have the impetus to do, itโs deeply tied to DHSโ mission.โ
The purpose of the office is to strike a middle ground between letting components โdo their own thingโ and not over-centralizing data collection and dissemination.
โOne of the reasons we were stood up as a department was to facilitate information-sharing following lessons learned after 9/11,โ Hysen said. โWe want to have an office at the department level and undertake some initiatives like a department-wide inventory so we have visibility into whatโs going on across the department, but structuring that work around a set of data domains that cut across components but are not as broad as the department as a whole. We might see ICE, USCIS, CBP developing an approach in the immigration domain that looks very different from TSA and Intelligence & Analysis in the counterterrorism domain. And thatโs by design. Weโre hoping the new team and the new office will expand their focus into providing more tools and resources for the components.โ
A major data interoperability focus is streamlining the โhandoffโ of data between CBP, ICE and USCIS regarding the immigration process. Each component has a part to play in facilitating legal immigration, resulting in lots of back-and-forth communication and data transfer.
Hysen previously worked at USCIS during the Obama administration, where he helped launch USCISโ Electronic Immigration System (ELIS). This prior experience gives him deeper insight into some of the interoperability issues facing the immigration-focused components.
โ[We want to get] noncitizens and unaccompanied kids out of unsafe conditions as quickly as possible and allow law enforcement officers to spend less time filling out paperwork and [focus on] actually keeping us safe,โ Hysen said. โIโve seen and want to do more to take opportunities that the components are surfacing themselves and provide the right forms for cross-department collaboration so we can break down some of these systems for sharing data, processes.โ
A successful strategy for doing good at DHS starts with being a servant leader, he added.
โWhat I saw in my prior work was, the way for someone in my role to be most effective is to be a servant leader and understand what our components need and how we can accelerate that work,โ he said.
While at USCIS, Hysen said former DHS CIO Luke McCormick held biweekly meetings with the USCIS CIO and senior leadership around an issue that had received a lot of negative press and โbad GAO reports.โ
โHis approach was: I trust you, you know whatโs best for your work, Iโm here to get things out of your way and help solve problems for you,โ Hysen said. โThat really struck me and thatโs a mindset Iโve tried to bring into my work as well. [I really want to use] IT as a critical tool to support the mission, whether that is processing at our southern border or enabling us to better support a surge in travel, or strengthening our information-sharing efforts with state and local law enforcement as we seek to counter domestic violent extremism.โ
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Trump Orders Spark Government-Wide Acquisition Overhaul
As Trump pushes for a faster, simpler procurement system, agencies are leveraging AI and adapting strategies to meet new requirements.
5m read -
New Army Acquisition Plan Cites Autonomy, Predictive Analytics
Officials outline how the Army Transformation Initiative signals a broader shift toward efficiency with tech and acquisition reform.
4m read -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read -
DOD Cyber Strategy to Adapt to New Budgets, Tech Innovation
Budgetary pressures spur innovation as department tackles aging infrastructure and evolving threats, says top cyber official.
4m read -
Accelerating Modernization to Boost Pentagonโs Efficiency
Sean OโLone, former senior assistant to the Department of Navy CIO and current CTO of SAICโs Navy Business Group, unpacks the future of defense IT modernization.
9m watch -
DISA, Navy Progress in Zero Trust Implementation Goals
Initiatives like Flank Speed and Thunderdome are proving successful scale in zero trust around lessons learned this year.
4m read -
Modernizing Maritime Medicine on USNS Mercy
Navy's Military Sealift Command is leveraging telepresence technology and extending wireless networks to transform the way medical care is delivered.
8m watch -
Navigating Zero Trust for Cybersecurity
The World Bank Group and Lumen advance zero-trust strategies and identity management to secure sensitive data.
18m watch -
New Executive Order Revamps Federal Acquisition Regulation
A new executive order streamlines federal acquisition in a bid to speed up government's ability to do business with commercial entities.
4m read -
Implementing Zero Trust to Boost Resiliency
Modernization, data security and culture shifts power zero trust at DOD and Red Hat.
32m watch