by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2015
The latest analysis of the Office of Personnel Management data breaches comes from OPM itself and involves one of the government’s most highly touted cybersecurity programs: Con- tinuous Diagnostics and Mitigation. When all the security tools enabled by the CDM program are in place, “the government can really have a point at which we can say, ‘Yes, we have a firm understanding.... Everybody’s now on the same page, reporting the exact same thing,’” Jeff Wagner, OPM’s direc- tor of security operations, told report- ers in August. The multiphase CDM program offers a system of dashboards that give net- work managers a clearer view of vul- nerabilities. CDM’s backers say the pro- gram does not thwart big breaches of federal networks but instead is a tool for discovering them. A series of breaches of OPM data- bases exposed the information of mil- lions of current and former federal employees, and FCW asked Wagner whether the breaches could have been prevented if all the CDM security tools had been in place. He said access con- trol was a key to the attack because the OPM: CDM will offer baseline security drones will be bought by U.S. individuals this year, the Consumer Electronics Association predicts 700K Trending hackers were able to take advantage of a contractor’s credentials, and after all the CDM tools are deployed, govern- ment officials can outline additional measures for addressing access control. The CDM program, whose acquisi- tion vehicle has a $6 billion ceiling, is divided into three phases. The first has given agencies tools to determine what devices are on their networks. The sec- ond and current phase focuses on doing a better job of identifying who is on those networks, and security products for identity management and network boundary protection are in the offing. The third phase will delve further into boundary protection and tackle inci- dent response. The catastrophic breaches of OPM — for which Director of National Intelli- gence James Clapper has named China as the leading suspect — triggered a maelstrom of outrage on Capitol Hill, including questions about what addi- tional tools federal IT managers need to combat unrelenting threats. Jim Quinn, lead system engineer for the CDM program at the Department of Homeland Security, told reporters that officials are considering accelerating the program’s timeline and potentially issuing task orders for Phase 3 next year. He said, however, that it would be unwise to rush deployment. Wagner praised officials at DHS and the General Services Administration for trying to speed up CDM’s deployment while saying the program can only go so fast. “Congress and everybody like to say: ‘Didn’t you do more?’” he said. “How much more can I do? It’s one of those things in which [you ask], ‘How fast can I go that doesn’t get me an [inspector general] flash audit?’” — Sean Lyngaas When CDM is in place, “the government can really have a point at which we can say, ‘Everybody’s now on the same page, reporting the exact same thing.’” — JEFF WAGNER, OFFICE OF PERSONNEL MANAGEMENT September 15, 2015 FCW.COM 3 FCW CALENDAR Analytics Netflix’s Kurt Brown is among the big-data experts speaking at TDWI San Diego, which features six days of training on the specific technologies and high-level strategies for managing, modeling and visualizing big data. San Diego. http://is.gd/FCW_TDWI Defense IT David DeVries, DOD’s deputy CIO, and DISA Director Lt. Gen. Alan Lynn are among the speakers at Defense Systems’ discussion of DOD’s Joint Information Environment. Arlington, Va. http://defensesystems.com/JIE 9/20-25 9/23 Customer experience ACT-IAC is hosting a half-day summit on “The CX Journey: Understanding Customers and Engaging Employees” to explore best practices, tactics and tools for better CX design. Washington, D.C . http://is.gd/FCW_cx 9/24 0915fcw_003-012.indd 3 8/24/15 4:15 PM
August 30, 2015
September 30, 2015