cyber

 

cyber

Weekly Roundup: October 16-20, 2017

Monday, October 23rd, 2017 - 10:30
John Kamensky

Insider Threats Part III: Advanced Analytic Techniques and the Challenges of Implementation

Wednesday, October 18th, 2017 - 12:55
The first two blogs in this Insider Threats series presented an overview of Insider Threat policies and key organizations and an assessment of current and recommended strategies for mitigating Insider Threats, respectively. 

Insider Threats Part II: Current and Recommended Strategies to Mitigate Insider Threats

Monday, October 16th, 2017 - 10:29
The first blog in this series presented information about Insider Threat policies and key organizations working to prevent Insider Threats.  This blog will focus on current, IT-based, and recommended, whole-person risk-rating, efforts to detect and prevent Insider Threats.  The next blog

Actionable Cybersecurity Practices for the 21st Century: Perspectives from Experts

Thursday, September 7th, 2017 - 11:36
By: 
The IBM Center recently partnered with the National Institute for Standards and Technology (NIST) and George Washington University Center for Cyber and Homeland Security to convene a set of interactive discussions among Chief Information Security Officers (CISOs) and other security executives in government and industry.  The meeting highlighted challenges and opportunities for action.

Weekly Roundup: June 26-30, 2017

Friday, June 30th, 2017 - 13:44
John Kamensky Restored Faith.  FedScoop reports on comments by Cong. Gerry Connelly at a conference, noting: “With agencies now required to report their spending data in compliance with the Digital Accountability and Transparency Act, it’s a chance for the federal government to earn some trust from the American people.”

Weekly Roundup: March 27 – April 7, 2017

Friday, April 7th, 2017 - 13:15
John Kamensky Warner Letter re: DATA Act. Federal News Radio reports: “Sen. Mark Warner (D-Va.) sent letters to 24 chief financial officer agencies on Friday, urging leadership to “prioritize efforts” to comply with the Digital Accountability and Transparency (DATA) Act. . . . Warner, an original backer of the DATA Act, asked five questions to agency leaders about their progress toward the May 2017 implementation deadline.”

Call for Research Report Proposals 2017

Wednesday, March 1st, 2017 - 14:13
Author(s): 
Leaders who understand and can leverage effective management tools and practices are better prepared to execute on their priorities and see measurable, positive program results. The IBM Center for The Business of Government is committed to helping identify and distill the lessons learned from the past, identify current and new management initiatives and capacities that will be needed to address key challenges facing the country in this administration, and offer ideas on implementation.

INTO THE GRAY ZONE: The Private Sector and Active Defense Against Cyber Threats

Tuesday, November 29th, 2016 - 14:12
Tuesday, November 29, 2016 - 12:56
Co-Author:  Christopher Ballister, Security & Privacy, IBM

Improving the Framework for Managing Cybersecurity Policy

Tuesday, September 20th, 2016 - 10:08
By: 
Tuesday, September 20, 2016 - 09:56
Below are ideas that I shared on this topic yesterday as part of a panel discussion with the White House’s Commission on Enhancing National Cybersecurity. Background  The policy framework that governs Federal IT with respect to cybersecurity has many pieces. Major laws include:

“Actionable Cybersecurity” – A Key Strategy for Government and Industry CIOs

Thursday, September 8th, 2016 - 11:00
By: 
Thursday, September 8, 2016 - 10:45
Federal Chief Information Officers, like their private sector CIO counterparts, lead the integration of information technology and organizational strategy.  CIOs must balance the daily needs of operational IT across their enterprise with how IT can contribute to longer term mission goals, while at the same time overseeing policy and resources for IT in a challenging fiscal environment.  U.S.