security

 

security

Integrating & Analyzing Data in Government—the Key to 21st Century Security: Observations from Brussels

Thursday, March 22nd, 2018 - 12:49
By: 
[Pictured Left:The Roundtable brought together leaders from the EU, NATO, DHS, State Department, and other stakeholder and EU member state officials.] The Brussels discussion focused on how the the EU and other European organizations and member states can work the Department of Homeland Security, Department of State and other US agencies, to best enable a trusted environment for sharing information.

John Pereira

Wednesday, March 21st, 2018 - 11:05
John Pereira is the Intelligence Community Fellow for The IBM Center for The Business of Government. John Pereira is also a Partner in IBM's Global Business Services and leads the team providing advanced, end-to-end solutions for our clients in the Intelligence Community (IC). John served 30+ years in CIA, including overseas assignments in East Asia, Central America, Central Eurasia, and Europe.

Sea, Land, Air, Space Superiority – Why are Near-Peer Adversaries able to Excel?

Tuesday, December 12th, 2017 - 14:06
By: 
Guest Blogger: Townley Cozad, Associate Partner, Defense & Intelligence, IBM Even as the United States remains the strongest, most capable military in the world, U.S. leadership in all domains is being challenged by “near-peer” competitors aggressively seeking to close the capability gap.  The military calls this “near-peer” (against someone who has similar weapons and abilities) warfare.

Drivers Transforming Government: Risk

Tuesday, November 28th, 2017 - 11:22
Note: The IBM Center recently released Seven Drivers Transforming Government, a series of essays exploring key drivers of change in government. It is based on our research and numerous insights shared by current and former government officials. This blog is the fourth in a series of excerpts from each of the seven essays.

Insider Threats Part II: Current and Recommended Strategies to Mitigate Insider Threats

Monday, October 16th, 2017 - 10:29
The first blog in this series presented information about Insider Threat policies and key organizations working to prevent Insider Threats.  This blog will focus on current, IT-based, and recommended, whole-person risk-rating, efforts to detect and prevent Insider Threats.  The next blog

Insider Threats Part I: Background and Organizations Working to Counter Insider Threats

Thursday, October 12th, 2017 - 13:37
Yet, the seriousness of Insider Threats motivates the ongoing efforts to implement systems and processes to inhibit their effects.  As the first in a three-part series on Insider Threats, this blog seeks to address the following: Part (1) What are the key organizations working on the Insider Threat problem (the post below, followed by the next two parts). Part (2) current and recommended strategies to countering Insider Threats, and Part (3) potential future strategies to counter Insider Threats. Defining an Insider Threat

Actionable Cybersecurity Practices for the 21st Century: Perspectives from Experts

Thursday, September 7th, 2017 - 11:36
By: 
The IBM Center recently partnered with the National Institute for Standards and Technology (NIST) and George Washington University Center for Cyber and Homeland Security to convene a set of interactive discussions among Chief Information Security Officers (CISOs) and other security executives in government and industry.  The meeting highlighted challenges and opportunities for action.

Personnel Assurance for Government: What Commercial Best Practices Can Bring to Help Modernize the Security Clearance Process

Wednesday, January 4th, 2017 - 15:18
By: 
Wednesday, January 4, 2017 - 10:27
Experience from industry practices and industry research regarding personnel security provide interesting insights and lessons learned for government to consider.   These findings emerged from a recent roundtable discussion held in November and co-hosted by the IBM Center for The Business of Government and the National Academy of Public Administration.  The roundtable intended to help identify commercial benchmarks that can inform government choices.

INTO THE GRAY ZONE: The Private Sector and Active Defense Against Cyber Threats

Tuesday, November 29th, 2016 - 14:12
Tuesday, November 29, 2016 - 12:56
Co-Author:  Christopher Ballister, Security & Privacy, IBM

Improving the Framework for Managing Cybersecurity Policy

Tuesday, September 20th, 2016 - 10:08
By: 
Tuesday, September 20, 2016 - 09:56
Below are ideas that I shared on this topic yesterday as part of a panel discussion with the White House’s Commission on Enhancing National Cybersecurity. Background  The policy framework that governs Federal IT with respect to cybersecurity has many pieces. Major laws include: