by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : August 2015
12 GCN AUGUST 2015 • GCN.COM How to avoid becoming the next OPM BY JOHN ZAROUR INDUSTRY INSIGHT AS WE LEARN MORE about the Office of Personnel Man- agement data breaches, fed- eral leaders are left wonder- ing how such incidents can occur and whether other agencies are vulnerable to similar attacks. The incident prompted Federal CIO Tony Scott to initiate a 30-day cybersecurity "sprint" that called on agencies to evalu- ate their security practices and address vulnerabilities. But federal agencies aren't the only ones that should be re-evaluating their approach to security. State and local govern- ments are also undoubtedly on the radar of today's ad- vanced cyberthreat actors. States collect valuable data, and many agencies store cit- izens' personally identifiable information just as the feds do. So while attention is focused on solving cyberse- curity in D.C., states should also be watching closely and investing in their own cyber defense efforts. To effectively address today's security needs, state and local IT leaders must embrace new ideas and in- novative technologies. One of the biggest op- portunities for improving security is through data analytics. Government organizations at every level --- from the biggest federal agencies down to local gov- ernment --- are producing, collecting and storing more data from more sources than ever before. Managing and using that information are daunting tasks for state and local governments, which have limited resourc- es and budgets. The biggest reason agen- cies aren't making the most of their data is that they don't have the right tools in place to do so. That's not to say analysis isn't happening. There are many state agen- cies that are successfully analyzing data and finding value in the information. In most cases, however, the analysis is happening in si- los using multiple technolo- gies for different datasets, which provides a limited view of the intelligence. States that wish to im- prove security practices and achieve operational, single- pane visibility should make sure they adopt analytics solutions that have: • The ability to pull in machine data from dispa- rate sources for analysis and the scalability to accept new data sources as they emerge. • The flexibility to corre- late the data from multiple sources (logs, clouds, appli- cations, sensors, networks, etc.) and visualize it via dashboards. • The speed to perform analysis quickly and support real-time responses to secu- rity breaches. Another emerging ca- pability that is becoming increasingly relevant for government is behavioral analytics. Most recent gov- ernment breaches, includ- ing the ones at OPM, were perpetrated by actors with legitimate credentials, and the same tactic has been used to infiltrate state and local government systems. Therefore, one of the keys to preventing a serious security incident is focusing on detecting the threats that are already on the network, whether they are insiders or external attackers who have illegally obtained valid credentials. Technologies that tap into machine-learning and data- driven behavioral analytics are better equipped to de- fend against breaches than traditional security informa- tion and event management solutions. The right ap- proach can enable security systems to identify anoma- lous behaviors by users and automatically tag them for further investigation. Comprehensive analytics capabilities are important to the security and modern- ization of state and local government. Security op- erations and policy changes are driven by intelligent decision-making, but gath- ering data and converting it into actionable intelligence are difficult without the right technologies to sup- port the process. Platform analytics enable both proac- tive detection and defensive threat mitigation, and the information can be shared across agency departments and deliver value more quickly. State and local agen- cies would be wise to keep all this in mind as they re-evaluate their security posture and explore invest- ing in solutions to help prevent their own OPM-like breaches. • --- John Zarour is director of state and local govern- ment and K-12 at Splunk. While attention is focused on solving cybersecurity in D.C., states should also be investing in their own cyber defense efforts.