security

 

security

Insider Threats Part II: Current and Recommended Strategies to Mitigate Insider Threats

Monday, October 16th, 2017 - 10:29
The first blog in this series presented information about Insider Threat policies and key organizations working to prevent Insider Threats.  This blog will focus on current, IT-based, and recommended, whole-person risk-rating, efforts to detect and prevent Insider Threats.  The next blog

Insider Threats Part I: Background and Organizations Working to Counter Insider Threats

Thursday, October 12th, 2017 - 13:37
Yet, the seriousness of Insider Threats motivates the ongoing efforts to implement systems and processes to inhibit their effects.  As the first in a three-part series on Insider Threats, this blog seeks to address the following: Part (1) What are the key organizations working on the Insider Threat problem (the post below, followed by the next two parts). Part (2) current and recommended strategies to countering Insider Threats, and Part (3) potential future strategies to counter Insider Threats. Defining an Insider Threat

Actionable Cybersecurity Practices for the 21st Century: Perspectives from Experts

Thursday, September 7th, 2017 - 11:36
By: 
The IBM Center recently partnered with the National Institute for Standards and Technology (NIST) and George Washington University Center for Cyber and Homeland Security to convene a set of interactive discussions among Chief Information Security Officers (CISOs) and other security executives in government and industry.  The meeting highlighted challenges and opportunities for action.

Personnel Assurance for Government: What Commercial Best Practices Can Bring to Help Modernize the Security Clearance Process

Wednesday, January 4th, 2017 - 15:18
By: 
Wednesday, January 4, 2017 - 10:27
Experience from industry practices and industry research regarding personnel security provide interesting insights and lessons learned for government to consider.   These findings emerged from a recent roundtable discussion held in November and co-hosted by the IBM Center for The Business of Government and the National Academy of Public Administration.  The roundtable intended to help identify commercial benchmarks that can inform government choices.

INTO THE GRAY ZONE: The Private Sector and Active Defense Against Cyber Threats

Tuesday, November 29th, 2016 - 14:12
Tuesday, November 29, 2016 - 12:56
Co-Author:  Christopher Ballister, Security & Privacy, IBM

Improving the Framework for Managing Cybersecurity Policy

Tuesday, September 20th, 2016 - 10:08
By: 
Tuesday, September 20, 2016 - 09:56
Below are ideas that I shared on this topic yesterday as part of a panel discussion with the White House’s Commission on Enhancing National Cybersecurity. Background  The policy framework that governs Federal IT with respect to cybersecurity has many pieces. Major laws include:

The IBM Center for The Business of Government

Monday, September 12th, 2016 - 20:17
The IBM Center for The Business of Government connects research to practice, applying scholarship to real world issues and decisions for government. The Center stimulates research and facilitates discussion of new approaches to improving the effectiveness of government at the federal, state, local, and international levels.

Global Security and Stability

Monday, September 12th, 2016 - 15:06
Monday, September 12, 2016 - 14:53
Global security and stability are becoming less obtainable due to a growing list of challenges. These challenges include, but are not limited to: proliferation of nuclear, biological, and chemical weapons; regional war among states; civil wars and failed states; international terrorism; global recession and poverty, international crime and drug cartels; and humanitarian crises and refugees. Many approaches have attempted to resolve these challenges; however, other means to resolve conflict and promote global security and stability are available and should be pursued more aggressively.

“Actionable Cybersecurity” – A Key Strategy for Government and Industry CIOs

Thursday, September 8th, 2016 - 11:00
By: 
Thursday, September 8, 2016 - 10:45
Federal Chief Information Officers, like their private sector CIO counterparts, lead the integration of information technology and organizational strategy.  CIOs must balance the daily needs of operational IT across their enterprise with how IT can contribute to longer term mission goals, while at the same time overseeing policy and resources for IT in a challenging fiscal environment.  U.S.

Weekly Roundup for September 2, 2016

Friday, September 2nd, 2016 - 14:19
Friday, September 2, 2016 - 13:45