security

 

security

Managing Advanced Threats in the Digital Age: Addressing security, risk and compliance for U.S. Public Sector executives

Wednesday, June 29th, 2016 - 13:14
These attacks are relentless, aggressive and constantly evolving, and have clearly shown that federal agencies and organizations are struggling in managing security threats, despite the stricter security protocols that are often in place at government agencies. Cyber threats are “among the most urgent dangers to America’s economic and national security,” President Obama was quoted as saying in a Wall Street Journal article in 2015.

Protecting Privacy and Security

Friday, June 17th, 2016 - 9:28
Friday, June 17, 2016 - 09:22
Privacy is a key concern of all – ensuring that our Personally Identifiable Information is protected, via strong IT Governance, Risk Management and Security programs, while it is collected, stored used and finally destroyed/deleted by those we’ve entrusted with it, is a key tenant of modern society. This is true whether the information is in digital form or otherwise.

Benefits of Effective IT Governance with Strong Security

Thursday, April 14th, 2016 - 11:19
Thursday, April 14, 2016 - 10:30
This post is the fourth in a series on how strong IT Governance can help drive effective security across Federal enterprises.  See the first installment.

New Organizational Structure Required for an Effective IT Governance Program With Strong Security

Wednesday, March 30th, 2016 - 10:16
Wednesday, March 30, 2016 - 10:01
This consists of a definition of IT Governance communicated throughout the agency, and the establishment of a new organizational structure to ensure the IT Governance Program is effective and continuously improved. Continuing with the Veterans Affairs Department (VA) example discussed in the previous blog, below is the definition VA developed and a generic discussion of the organizational structure that VA adopted.

Creating the appropriate environment for successful adoption of IT Governance that supports improved security

Monday, March 21st, 2016 - 8:53
Friday, March 18, 2016 - 11:08
To start, guiding principles can ensure that all staff have a common understanding of the core IT Governance criteria. These guiding principles let staff know that IT Governance is recognized by the C-Suite as critical to the organization’s success, and that IT resources result in maximum effectiveness and efficiency across the organization. It ensures that security is integrated in meeting requirements and delivers benefits set by an organization’s business leaders.

A Roadmap for Implementing and Improving IT Governance

Monday, March 7th, 2016 - 15:31
Monday, March 7, 2016 - 14:24
As previously discussed, all Federal departments/agencies were charged with establishing an IT Governance program per OMB Memorandum M-09-02.

IT Governance, Risk Management, Security & Privacy – a Perspective for the C-Suite

Monday, February 29th, 2016 - 15:03
Monday, February 29, 2016 - 13:40
Today, more than ever, with the increasing number of cybersecurity attacks on government organizations and threats of data breaches to the privacy of government officials and their staffs, and government contractor staffs, strong IT Governance based on sound IT risk management is critical to restoring confidence in the security and privacy protections provided by our Federal Government.  This is no longer purely an IT technology issue but an issue that must be addressed at the top layers of government – from the “overseers” of IT policy (e.g., Office of Management and Budget (OMB), Nat

Insights from Dr. Phyllis Schneck, Deputy Under Secretary for Cybersecurity and Communications, National Protection and Programs Directorate, U.S. Department of Homeland Security

Tuesday, October 27th, 2015 - 11:40
Posted by: 
As a nation, we are faced with pervasive cyber threats. Malicious actors, including those at nation-state level, are motivated by a variety of reasons that include espionage, political and ideological beliefs, and financial gain. The U.S. Department of Homeland Security (DHS) and its National Protection and Programs Directorate works to assist federal agencies to understand and manage cyber risk, reduce the frequency and impact of cyber incidents, readily identify network security issues and take prioritized action. What are DHS’s key cybersecurity and communications priorities?

New Report from the IBM Center: A Framework to Improve Management of Cyberspace

Wednesday, February 4th, 2015 - 11:37
Wednesday, February 4, 2015 - 10:34
This report is the product of a group of experts, which was convened by the Department of Computer Science at the Indiana University of Pennsylvania (IUP). IUP brought together an interdisciplinary panel of experts in national security, international relations, foreign policy, information system network and security, public policy, and computer science. These experts participated in two collaborative roundtable meetings during the first six months of 2014.

Defining a Framework for Decision Making in Cyberspace

Wednesday, February 4th, 2015 - 11:33
Author(s): 
This report is the product of a group of experts, which was convened by the Department of Computer Science at the Indiana University of Pennsylvania (IUP). IUP brought together an interdisciplinary panel of experts in national security, international relations, foreign policy, information system network and security, public policy, and computer science. These experts participated in two collaborative roundtable meetings during the first six months of 2014.
0 comments
The content of this field is kept private and will not be shown publicly.

Your comment will appear after administrative review.

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.

0 recommendations