{"id":2296,"date":"2025-03-12T12:36:37","date_gmt":"2025-03-12T12:36:37","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2296"},"modified":"2025-03-12T12:36:37","modified_gmt":"2025-03-12T12:36:37","slug":"cisa-cybersecurity-workforce-faces-cuts-amid-shifting-us-strategy","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2296","title":{"rendered":"CISA cybersecurity workforce faces cuts amid shifting US strategy"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>The US government\u2019s cybersecurity defenses are under strain after the White House-backed Department of Government Efficiency (DOGE) abruptly terminated key contracts, leading to the dismantling of two red teams within the Cybersecurity and Infrastructure Security Agency (CISA). The move has sparked concerns about the federal government\u2019s ability to defend against cyber threats amid increasing geopolitical tensions.<\/p>\n<p>The layoffs, which affected more than 100 cybersecurity specialists, were disclosed by former CISA <a href=\"https:\/\/www.csoonline.com\/article\/571697\/penetration-testing-explained-how-ethical-hackers-simulate-attacks.html\">penetration tester<\/a> Christopher Chenoweth, who revealed on LinkedIn that DOGE had scrapped the contract supporting his red team and a second critical team within days.<\/p>\n<p>\u201cOn Friday, February 28, 2025, at 1600 hours, the government contract I supported with CISA (Dept of Homeland Security) was terminated due to DOGE,\u201d <a href=\"https:\/\/www.linkedin.com\/posts\/christopher-chenoweth-91a68026_on-friday-february-28-2025-at-1600-hours-activity-7304793481518940160-uTUo\/\">Chenoweth wrote in the LinkedIn post<\/a>. \u201cDOGE cut our entire red team and all support roles \u2014 over 100 people impacted. The following Wednesday, DOGE cut a second CISA red team also doing mission-critical work.\u201d<\/p>\n<p>These teams were tasked with identifying vulnerabilities in government networks and strengthening national cybersecurity defenses. Their sudden dismissal raises questions about the Biden administration\u2019s cybersecurity strategy and whether budget cuts are compromising national security.<\/p>\n<p>Chenoweth is not the only one to go vocal about what is happening at CISA.<\/p>\n<p>\u201cThe treatment that we are being given right now is enough to cause me and my family soul-crushing loss,\u201d Kelly Shaw, a former employee of CISA wrote in another <a href=\"https:\/\/www.linkedin.com\/pulse\/defending-americas-cyber-defenders-jen-easterly-hae2e\/?trackingId=7av47OJ0T1KndRYilWRwmQ%3D%3D\">LinkedIn post<\/a>. \u201cOur dreams are being shattered, our livelihood is being destroyed, and our nation will be less secure all because of some quick political points being scored.\u201d<\/p>\n<p>Shaw had joined CISA from Naval Intelligence three years ago and was part of the CyberSentry program. More than 130 people from this division were fired in the last week of February.<\/p>\n<p>\u201cOn February 14th, I received an email from someone I had never heard of telling me that I was not meeting the needed knowledge, skills, and abilities,\u201d Shaw narrated. \u201cMy 30 years of network experience, two Internet Service provider businesses, 14 years of federal service to the Nation, education, and performance appraisals say otherwise.\u201d<\/p>\n<p>Jen Easterly, the former director of CISA, too had raised concerns about what is happening at the premier cybersecurity agency.<\/p>\n<p>\u201cAs I understand it (and to be fair, it is an imperfect understanding from someone who is now on the outside), some folks have been justifiably let go for performance reasons and exceptions have been made for others,\u201d <a href=\"https:\/\/www.linkedin.com\/pulse\/defending-americas-cyber-defenders-jen-easterly-hae2e\/?trackingId=7av47OJ0T1KndRYilWRwmQ%3D%3D\">Easterly wrote in a LinkedIn post.<\/a> \u201cBut as I\u2019ve seen across this platform over the past week, the exceptions are not preventing some fantastic teammates from being fired.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Sweeping cuts across Homeland Security<\/h2>\n<p>DOGE, an oversight unit established by Elon Musk and endorsed by the Trump administration, has been aggressively eliminating federal contracts, claiming to <a href=\"https:\/\/doge.gov\/savings\">reduce government waste<\/a>. While its public records list 86 canceled contracts at the Department of Homeland Security (DHS), it does not explicitly mention penetration testing, leaving uncertainty over the justification behind the cybersecurity team layoffs.<\/p>\n<p>Adding to concerns, other critical cybersecurity programs have also been defunded, including the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC). The center, which provided cyber threat intelligence to election officials and state agencies, <a href=\"https:\/\/www.cisecurity.org\/ei-isac\">announced<\/a> its closure after DHS pulled its funding.<\/p>\n<p>Meanwhile, the Multi-State Information Sharing and Analysis Center (MS-ISAC), a 20-year-old cybersecurity collaboration hub between federal, state, and local governments, is also at risk of losing support.<\/p>\n<h2 class=\"wp-block-heading\">A shift in US cybersecurity strategy?<\/h2>\n<p>Analysts suggest these layoffs and funding cuts indicate a broader strategic shift in the U.S. government\u2019s cybersecurity approach. Neil Shah, VP at Counterpoint Research, sees both risks and opportunities in the restructuring.<\/p>\n<p>\u201cIn the near to mid-term, this could weaken the US cybersecurity infrastructure. However, with AI proliferating, the US government likely has a Plan B \u2014 potentially shifting toward privatized cybersecurity infrastructure projects, similar to what we\u2019re seeing with Project Stargate for AI,\u201d Shah said.<\/p>\n<p>\u201cIf these gaps aren\u2019t filled with viable alternatives, vulnerabilities could escalate from small-scale exploits to large-scale cyber incidents at state or federal levels. Signs point to a broader cybersecurity strategy reboot, with funding likely being redirected toward more efficient and sophisticated players rather than a purely vertical, government-led approach.\u201d<\/p>\n<p>While some fear heightened risks, others argue the shift could lead to more tech-driven solutions. Faisal Kawoosa, founder and lead analyst at Techarc, views the move as part of a larger digital transformation.<\/p>\n<p>\u201cElon Musk\u2019s role is not just about cost-cutting but also about leveraging technology to create more efficient systems,\u201d Kawoosa said. \u201cDOGE operates as a digital transformation program for US governance, exploring tech-first approaches to achieving similar or better results.\u201d<\/p>\n<p>He added that such a significant decision was unlikely without an impact assessment. \u201cI don\u2019t foresee a major security threat arising from this shift. While initial gaps may appear, given Musk\u2019s rapid execution style, it won\u2019t take long for a new system to deliver comparable or improved outcomes.\u201d<\/p>\n<p>Yugal Joshi, a partner at Everest Group, expressed skepticism over dismantling key cybersecurity initiatives amid increasing global threats.<\/p>\n<p>\u201cGiven the polarizing and increasingly vulnerable global environment, it is hard to believe the US government is dismantling such key organizations,\u201d Joshi said. \u201cCritical infrastructure across the globe, especially in the US, faces constant threats, and CISA\u2019s red team played a crucial role in defense. Winding up CISA\u2019s red team and MS-ISAC may cause more harm than shutting down EI-ISAC, given their broader and more critical roles.\u201d<\/p>\n<p>While he warned of long-term consequences, Joshi acknowledged a possible silver lining. \u201cThis move could be detrimental in the long run. However, an overlap of federal and state cybersecurity responsibilities might make states better prepared \u2014 if they receive adequate funding. It could also lead to a more accountable approach, reducing unchecked spending.\u201d<\/p>\n<p>He further noted that should a major cyber incident occur, it would serve as a validation of CISA\u2019s importance. \u201cIf something significant happens, it will prove to critics that these departments were indeed creating value, something that was always under scrutiny.\u201d As the federal government continues its restructuring under DOGE\u2019s directive, the long-term consequences of these cybersecurity cutbacks remain uncertain. Security experts warn that the US could be significantly more vulnerable to evolving cyber threats, unless new systems swiftly bridge the gaps left behind.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The US government\u2019s cybersecurity defenses are under strain after the White House-backed Department of Government Efficiency (DOGE) abruptly terminated key contracts, leading to the dismantling of two red teams within the Cybersecurity and Infrastructure Security Agency (CISA). The move has sparked concerns about the federal government\u2019s ability to defend against cyber threats amid increasing geopolitical [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2297,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2296","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2296"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2296"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2296\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2297"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}