by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : August and September 2016
S -11 Ever since the Cyber Spri nt, the admi nistration has made teaching federal employees better cyber hygiene one of its top priorities. The State Depar tment, for example, recently announced an i nitiative to test how its employees respond to phishing attempts. The admi nistration also realizes that its oppor tunity to improve cyber resilience is drawing to a close. With the impending election, they are trying to ensure that their cyber i nitiatives have enough momentum to continue into the new admi nistration, said Trevor Rudolph, chief of OMB’s Cyber and National Security Unit, speak ing at a June 15 presentation to the Information a nd Security Privacy Advisor y Board . “We’re headed in the r ight direction,” Rudolph said. THE CYBER RESILIENCE TOOLKIT SECURITY INCIDENT AND EVENT MANAGEMENT Agencies collect vast troves of security data through firewalls, vulnerability scanners, intrusion detection systems and other appliances and applications. SIEM analyzes and correlates that data, helping cybersecurity officials identify, prioritize, and respond to potential security threats across the enterprise. NETWORK VISIBILITY The complexity of the federal IT enterprise presents a major challenge for cybersecurity experts. Most monitoring tools are system-specific; making it difficult to analyze, manage, and secure IT operations at the enterprise level. A new class of tools is providing IT leaders with pervasive visibility in real time. INTELLIGENCE-DRIVEN SECURITY Agencies that focus their efforts on defending against attacks are fighting a losing battle. There is no way they can keep up with the constantly evolving cyber threat landscape. Intelligence- driven security leverages information on that threat landscape to help agencies proactively assess the risks they face and develop strategies for detecting and responding to attacks. APPLICATION SECURITY With more services moving to the cloud, enterprise applications have become a potential cybersecurity flashpoint. Agencies need to ensure their applications and all associated data are secure no matter where it resides, whether in a traditional data center, a virtual data center, a managed cloud service environment, or in a public cloud. DATA LOSS PREVENTION Cloud, mobility, and related trends in the enterprise have made it easier for employees to access data any time, from anywhere, using any device. While this ease of access is a boon for employee productivity, it complicates cybersecurity efforts. Data loss prevention tools provide a way to track and manage sensitive data wherever it resides or whenever it is in motion. ENTERPRISE RISK MANAGEMENT Risk management is an essential discipline in cybersecurity. If agencies don’t understand the risks associated with given systems across their enterprise, they can’t make informed decisions about how to prioritize and protect them. An enterprise risk management system aggregates and visualizes risk-related data to create an integrated, holistic view of risks facing an enterprise. SPONSORED CONTENT
June and July 2016
October and November 2016