security

 

security

Creating the appropriate environment for successful adoption of IT Governance that supports improved security

Monday, March 21st, 2016 - 8:53
Friday, March 18, 2016 - 11:08
To start, guiding principles can ensure that all staff have a common understanding of the core IT Governance criteria. These guiding principles let staff know that IT Governance is recognized by the C-Suite as critical to the organization’s success, and that IT resources result in maximum effectiveness and efficiency across the organization. It ensures that security is integrated in meeting requirements and delivers benefits set by an organization’s business leaders.

A Roadmap for Implementing and Improving IT Governance

Monday, March 7th, 2016 - 15:31
Monday, March 7, 2016 - 14:24
As previously discussed, all Federal departments/agencies were charged with establishing an IT Governance program per OMB Memorandum M-09-02.

IT Governance, Risk Management, Security & Privacy – a Perspective for the C-Suite

Monday, February 29th, 2016 - 15:03
Monday, February 29, 2016 - 13:40
Today, more than ever, with the increasing number of cybersecurity attacks on government organizations and threats of data breaches to the privacy of government officials and their staffs, and government contractor staffs, strong IT Governance based on sound IT risk management is critical to restoring confidence in the security and privacy protections provided by our Federal Government.  This is no longer purely an IT technology issue but an issue that must be addressed at the top layers of government – from the “overseers” of IT policy (e.g., Office of Management and Budget (OMB), Nat

Insights from Dr. Phyllis Schneck, Deputy Under Secretary for Cybersecurity and Communications, National Protection and Programs Directorate, U.S. Department of Homeland Security

Tuesday, October 27th, 2015 - 11:40
Posted by: 
As a nation, we are faced with pervasive cyber threats. Malicious actors, including those at nation-state level, are motivated by a variety of reasons that include espionage, political and ideological beliefs, and financial gain. The U.S. Department of Homeland Security (DHS) and its National Protection and Programs Directorate works to assist federal agencies to understand and manage cyber risk, reduce the frequency and impact of cyber incidents, readily identify network security issues and take prioritized action. What are DHS’s key cybersecurity and communications priorities?

New Report from the IBM Center: A Framework to Improve Management of Cyberspace

Wednesday, February 4th, 2015 - 11:37
Wednesday, February 4, 2015 - 10:34
This report is the product of a group of experts, which was convened by the Department of Computer Science at the Indiana University of Pennsylvania (IUP). IUP brought together an interdisciplinary panel of experts in national security, international relations, foreign policy, information system network and security, public policy, and computer science. These experts participated in two collaborative roundtable meetings during the first six months of 2014.

Defining a Framework for Decision Making in Cyberspace

Wednesday, February 4th, 2015 - 11:33
Author(s): 
This report is the product of a group of experts, which was convened by the Department of Computer Science at the Indiana University of Pennsylvania (IUP). IUP brought together an interdisciplinary panel of experts in national security, international relations, foreign policy, information system network and security, public policy, and computer science. These experts participated in two collaborative roundtable meetings during the first six months of 2014.

How Will Government Adapt?: Shifting Defense Priorities and Fiscal Realities

Tuesday, January 20th, 2015 - 15:03
Tuesday, January 20, 2015 - 13:59
In particular, the Department must focus on mitigating high-risk issues and inefficiencies, including data security and accessibility, base realignment, and cost of employee benefits. The Department has already made progress in employing a change management approach, but further effort is needed. In light of these challenges, the Department can seize the current opportunity to maximize its resources and cultivate more strategic enterprise-level leadership.

Achieving Cost-Effective, Mission-Based Cybersecurity: Using Risk Management and Analytics to Manage Vulnerabilities and Threats

Thursday, March 27th, 2014 - 6:36
By: 
Wednesday, March 26, 2014 - 11:27
Engaging leaders in protecting an organizations’ cyber, IT, and information assets is a critical starting point to effective security. A next logical step for any government or commercial organization is to leverage risk management and analytics to implement a mission-based security program. As organizations move forward, guidance from NIST and evolving capabilities in industry are merging to paint a path forward for agencies to follow.

Using the C-Suite to Manage your Risky Business

Monday, February 17th, 2014 - 10:01
By: 
Monday, February 17, 2014 - 08:51
As the world becomes more digitized and interconnected, the door to emerging threats and proprietary data leaks has opened wider. The number of security breaches affecting enterprises across numerous industries continues to grow, seemingly day-by-day. Once a topic restricted to the IT organization, it is now unquestionably a C-suite priority. A strong plan for risk management throughout the organization has become essential.

Previous Center Newsletters

Thursday, October 3rd, 2013 - 14:14
Interested in reviewing one of our previous newsletters?  Below is a listing of previous newsletters.  Sign up to receive our e-newsletters in the future. Enterprise Risk Management and How Inspectors General Work with Agencies and Congress - May 18, 2015
Cover Image: 
0 comments
The content of this field is kept private and will not be shown publicly.

Your comment will appear after administrative review.

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.

0 recommendations