Submitted by rgordon on Wed, 03/28/2018 - 16:27
[Pictured Left:The Roundtable brought together leaders from the EU, NATO, DHS, State Department, and other stakeholder and EU member state officials.]
The Brussels discussion focused on how the the EU and other European organizations and member states can work the Department of Homeland Security, Department of State and other US agencies, to best enable a trusted environment for sharing information.
Submitted by TFryer on Wed, 01/24/2018 - 17:49
As the world becomes more digitized and interconnected, the door to emerging threats and proprietary data leaks has opened wider. The number of security breaches affecting enterprises across numerous industries continues to grow, seemingly day-by-day. Once a topic restricted to the IT organization, it is now unquestionably a C-suite priority. A strong plan for risk management throughout the organization has become essential.
Submitted by TFryer on Wed, 01/24/2018 - 16:20
Engaging leaders in protecting an organizations’ cyber, IT, and information assets is a critical starting point to effective security. A next logical step for any government or commercial organization is to leverage risk management and analytics to implement a mission-based security program. As organizations move forward, guidance from NIST and evolving capabilities in industry are merging to paint a path forward for agencies to follow.
Submitted by TFryer on Mon, 01/22/2018 - 21:10
In particular, the Department must focus on mitigating high-risk issues and inefficiencies, including data security and accessibility, base realignment, and cost of employee benefits. The Department has already made progress in employing a change management approach, but further effort is needed. In light of these challenges, the Department can seize the current opportunity to maximize its resources and cultivate more strategic enterprise-level leadership.
Submitted by TFryer on Mon, 01/22/2018 - 20:42
This report is the product of a group of experts, which was convened by the Department of Computer Science at the Indiana University of Pennsylvania (IUP). IUP brought together an interdisciplinary panel of experts in national security, international relations, foreign policy, information system network and security, public policy, and computer science. These experts participated in two collaborative roundtable meetings during the first six months of 2014. The report presents results from the roundtable discussions, as well as other research conducted by the author.