cyber

 

cyber

Weekly Roundup: March 27 – April 7, 2017

Friday, April 7th, 2017 - 13:15
John Kamensky Warner Letter re: DATA Act. Federal News Radio reports: “Sen. Mark Warner (D-Va.) sent letters to 24 chief financial officer agencies on Friday, urging leadership to “prioritize efforts” to comply with the Digital Accountability and Transparency (DATA) Act. . . . Warner, an original backer of the DATA Act, asked five questions to agency leaders about their progress toward the May 2017 implementation deadline.”

Call for Research Report Proposals 2017

Wednesday, March 1st, 2017 - 14:13
Author(s): 
Leaders who understand and can leverage effective management tools and practices are better prepared to execute on their priorities and see measurable, positive program results. The IBM Center for The Business of Government is committed to helping identify and distill the lessons learned from the past, identify current and new management initiatives and capacities that will be needed to address key challenges facing the country in this administration, and offer ideas on implementation.

INTO THE GRAY ZONE: The Private Sector and Active Defense Against Cyber Threats

Tuesday, November 29th, 2016 - 14:12
Tuesday, November 29, 2016 - 12:56
Co-Author:  Christopher Ballister, Security & Privacy, IBM

Improving the Framework for Managing Cybersecurity Policy

Tuesday, September 20th, 2016 - 10:08
By: 
Tuesday, September 20, 2016 - 09:56
Below are ideas that I shared on this topic yesterday as part of a panel discussion with the White House’s Commission on Enhancing National Cybersecurity. Background  The policy framework that governs Federal IT with respect to cybersecurity has many pieces. Major laws include:

“Actionable Cybersecurity” – A Key Strategy for Government and Industry CIOs

Thursday, September 8th, 2016 - 11:00
By: 
Thursday, September 8, 2016 - 10:45
Federal Chief Information Officers, like their private sector CIO counterparts, lead the integration of information technology and organizational strategy.  CIOs must balance the daily needs of operational IT across their enterprise with how IT can contribute to longer term mission goals, while at the same time overseeing policy and resources for IT in a challenging fiscal environment.  U.S.

National Cybersecurity Center of Excellence (NCCoE) – Accelerating the Deployment and Use of Security Technologies

Monday, August 22nd, 2016 - 14:46
Monday, August 22, 2016 - 14:40
Blog Co-Author:  Christopher Ballister

Nate Lesser

Friday, July 29th, 2016 - 11:13
Phrase: 
What is the mission of the National Cybersecurity Center of Excellence (NCCoE)? What are its strategic priorities? How does it accelerate the deployment and use of secure, standards-based technologies? Join host Michael Keegan as he explores these questions and more with Nate Lesser, Deputy Director, NCCoE.
Radio show date: 
Mon, 08/08/2016
Guest: 
Intro text: 
What is the mission of the National Cybersecurity Center of Excellence (NCCoE)? What are its strategic priorities? How does it accelerate the deployment and use of secure, standards-based technologies? What are some of the key cyber challenges facing us today? Join host Michael Keegan as he explores these questions and more with Nate Lesser, Deputy Director, National Cybersecurity Center of Excellence.

Nate Lesser

Friday, July 29th, 2016 - 11:12
Nate Lesser is the deputy director of the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology. The NCCoE collaborates with members of industry, government and academia to build open, standards-based, modular and practical reference designs; that address cybersecurity challenges in key economic sectors. The center benefits from formal partnerships with market leaders including several Fortune 50 companies.

Achieving IT Security Intelligence

Monday, July 18th, 2016 - 8:54
Posted by: 
No longer can security programs rely on “if it’s not broke, don’t fix it”–the bad guys could already be inside your systems, stealing your data or probing to get in. Too many CIOs and CISOs are looking for jobs because they thought their systems and data were secure when, in fact, the opposite was true. Security programs need effective protection of valuable information and systems to prevent data breaches and to comply with the ever-increasing federal compliance requirements (e.g., FISMA, the Privacy Act, NIST, OMB mandates, FedRAMP, HIPAA/HITECH, etc.).

Christopher Ballister

Wednesday, June 29th, 2016 - 13:26
Chris Ballister is an Associate Partner for IBM in the Cybersecurity & Privacy Service Area.  His work focuses on the relationship of information security, IT governance, privacy, and risk management supporting the C-Suite throughout the public sector.  Chris has served in government at the senior executive level as both a deputy and Chief Information Officer at the US House, White House, and Office of Inspector General at Health and Human Services. 
0 comments
The content of this field is kept private and will not be shown publicly.

Your comment will appear after administrative review.

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.

0 recommendations