by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : January and February 2017
A top challenge for every government agency today is the effective management of cybersecurity risks. Protecting government information and citizens’ personal data has become more challenging as our networks and the amount of data on them has grown exponentially. Integrated, automated response to the growing wave of cyberattacks is the only way for network defenders to keep up. Best practices from the National Institute of Standards and Technology (NIST) offer a proven approach to cyber risk management. They guide you toward the right cyber investment decisions that help reduce risk to acceptable levels for your specific agency. Government agencies rely on technology to complete their missions each day. However, this technology has also grown more complex and diverse over the years. There are now more endpoints, greater reliance on the cloud and enhanced mobility. These advances improve productivity and efficiency, but also make the job of network management a more complex endeavor. Instead of simply protecting a set of applications and data within a defined perimeter, government agencies today must also protect the sensitive information that leaves the traditional perimeter though cloud applications and mobile devices. At the same time, cyber-attackers have become more aggressive and sophisticated. They’re constantly finding new ways to infiltrate networks and steal both intellectual property and private citizen information. The sheer volume of Distributed Denial of Service (DDoS) attacks, which can shut down a network, also are on the rise. Agencies at all levels of government are dealing with these changes. A report from KPMG and (ISC)2 , for example, found 65 percent of federal cyber executives don’t believe the federal government is equipped to detect ongoing cyberattacks. 1 On the state and local level, a report from Deloitte and NASCIO2 found more than half of state officials aren’t confident their state’s information assets EXECUTIVE INSIGHTS SPONSORED CONTENT Take Cybersecurity to the Next Level A risk-based approach leveraging automation is one of the best ways to give your cybersecurity posture a solid foundation. Shutterstock.com
October and November 2016