by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : October 2014
Sharing and Safeguarding in Decem- ber 2012. In the 2013 edition of PM-ISE’s annual report, Paul reports on the organization’s progress in imple- menting the objectives of the national strategy. Below are a few important highlights: • One positive accomplishment has been the establishment and success of the Suspicious Activity Reporting program, which enables federal, state and local jurisdictions to readily and rapidly share information regarding suspicious activity. Nevertheless, a report published last year outlines ongoing issues and recommends improvements to the SAR program. The ISA IPC is overseeing the imple- mentation of the recommendations. • To support improved information discovery and access through com- mon standards, the FBI’s Criminal Justice Information Services Divi- sion expanded the capabilities of law enforcement’s National Data Exchange to accommodate more records and users, and officials began sharing investigative reports in near-real time with criminal justice partners. Furthermore, the Defense Department took a major step forward in promoting common standards with the decision to adopt the National Information Exchange Model (NIEM) for standards-based data exchange. • In light of the WikiLeaks and Edward Snowden incidents, sharing and safeguarding information requires enforcing the controls that are neces- sary to protect sensitive and classified information, as well as the privacy, civil rights and civil liberties of indi- viduals. But it is also necessary to provide efficient access to mission- critical information so that analysts, operators and investigators can effec- tively perform their jobs. Striking the correct balance will continue to be a challenge for the members of ISE. • As cybersecurity threats have grown, PM-ISE is playing a more direct role in government by working with DHS and critical infrastructure companies to help define governance and technical standards by which sen- sitive information regarding cyberse- curity threats can be shared. DHS has expanded its Enhanced Cybersecurity Services program in accordance with Executive Order 13636 (Improving Critical Infrastructure Cybersecurity) to better assist critical infrastructure owners and operators with protecting their systems. When I was DHS CIO from 2009 to 2013, I worked closely on infor- mation-sharing issues with PM-ISE; across the federal, state, local, tribal and territorial governments; and with groups such as the IJIS Institute and the International Association of Chiefs of Police. During that time, I saw tre- mendous improvements to informa- tion sharing and a deep concern for addressing privacy and civil liberties issues. I found the dedication of people at all levels of government inspir- ing, especially given that trying to achieve consensus among multiple government bureaucracies can be truly daunting. The highlights from PM-ISE’s 2013 annual report give a sense of that progress and the maturation of our efforts to share and safeguard infor- mation. In particular, I would note that PM-ISE has helped spread the idea that innovation prospers when it is based on standards for sharing information. I can state emphatically that we are safer today because of efforts of many individuals at many departments and agencies in the fed- eral government, along with partners at state and local governments and even in the private sector. Yet there is still much that can and should be done. For example, there are significant gaps in information sharing. Some of them are cultural, but many could be addressed through the proper use of emerging technol- ogies that help ensure that informa- tion is being properly shared with the proper partners, in the proper context and with the appropriate privacy pro- tections in place. In particular, we need: • Greater support for programs that rely on federated identity, credential and access management. Those pro- grams are crucial if we are to move to a higher level of information shar- ing, particularly as we wish to make information discoverable across the boundaries of government. ICAM systems must be interoperable and part of a larger ecosystem to enable cross-organizational identity man- agement. We need a vibrant identity ecosystem that is privacy-enhancing, secure, resilient, interoperable, cost- effective and easy to use, as outlined in the National Strategy for Trusted Identities in Cyberspace. October 2014 FCW.COM 37 When I was DHS CIO, I found the dedication of people at all levels of government inspiring, especially given that trying to achieve consensus among multiple government bureaucracies can be truly daunting.
September 30, 2014
November and December 2014