Submitted by SGold on Tue, 12/26/2017 - 16:40
Submitted by sfreidus on Tue, 12/26/2017 - 13:28
No longer can security programs rely on “if it’s not broke, don’t fix it” — adversaries could already be inside systems, stealing data or probing to get in. Too many CIOs and CISOs have thought their systems and data were secure when in fact the opposite was true. Security programs need effective protection of valuable information and systems to prevent data breaches, and to comply with the ever increasing federal compliance requirements (such as the Federal Information Security Management Act (FISMA), the Privacy Act, policy and guidance from the Office of Management and Budget (OMB) an
Submitted by sfreidus on Tue, 12/26/2017 - 12:37
Submitted by cmasingo on Fri, 12/22/2017 - 14:11
Blog Co-Author: Christopher Ballister
Submitted by cmasingo on Fri, 12/22/2017 - 13:53
Federal Chief Information Officers, like their private sector CIO counterparts, lead the integration of information technology and organizational strategy. CIOs must balance the daily needs of operational IT across their enterprise with how IT can contribute to longer term mission goals, while at the same time overseeing policy and resources for IT in a challenging fiscal environment. U.S.
Submitted by cmasingo on Fri, 12/22/2017 - 13:39
Submitted by cmasingo on Fri, 12/22/2017 - 12:05
Co-Author: Christopher Ballister, Security & Privacy, IBM
Submitted by cmasingo on Thu, 12/21/2017 - 13:24
Submitted by cmasingo on Thu, 12/21/2017 - 11:17
Restored Faith. FedScoop reports on comments by Cong. Gerry Connelly at a conference, noting: “With agencies now required to report their spending data in compliance with the Digital Accountability and Transparency Act, it’s a chance for the federal government to earn some trust from the American people.”
Submitted by cmasingo on Thu, 12/21/2017 - 09:33
The IBM Center recently partnered with the National Institute for Standards and Technology (NIST) and George Washington University Center for Cyber and Homeland Security to convene a set of interactive discussions among Chief Information Security Officers (CISOs) and other security executives in government and industry. The meeting highlighted challenges and opportunities for action.