by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : June 15, 2016
And then there are state privacy and data breach laws, Control Objectives for Information and Related Technology, and various international standards and privacy directives. Complying with those and other requirements often takes a significant amount of time and effort to prioritize issues, develop appropriate policies and controls, and monitor compliance. To address external, internal and compliance challenges proactively, a mission-oriented cognitive cybersecurity capa- bility is needed. To achieve that capability, four key areas must be addressed: • Security architecture effectiveness. Agencies must focus on rapidly assessing vulnerabilities in the security architecture and developing a prioritized roadmap that plugs security gaps and meets policy expectations. Ensuring the identity of users and their access rights and reducing the number of privileged users are critically important to effec- tive security architecture. • Critical data protection. Agencies must focus on rapidly assessing the data architecture and identifying shortfalls in tracking and protecting critical data. Prioritized action plans can reshape data architecture for more focused security protection and better continuous monitoring. • Security compliance. Agencies must focus on rapidly assessing compliance gaps and establishing a roadmap to prioritize issues, develop appropriate policies and controls, and achieve compliance. • A holistic security program. Effectively implementing the first three areas enables agencies to lay the founda- tion for a program that addresses risk management and IT governance at the enterprise level. Organizations can then identify risks to critical business processes that are most important to mission success, as well as threats and vulnerabilities that can affect critical business processes. They can also craft appropriate IT governance, which is a key enabler of successful cybersecurity protection. IT governance provides the “tone at the top” and emphasizes that ensuring security and privacy is the responsibility of all employees. In addition, consistent and standardized security pro- tocols, privacy processes and technology configurations support protection at a lower cost. A holistic security program focuses on protection through continuous monitoring of systems and data. That involves moving from the traditional defensive-reactive approach to a defensive-proactive (predictive) approach, using cyber analyt- ics to foster security intelligence that also protects privacy. Continuous monitoring is now required by OMB and NIST mandates, and it can be supplemented using cyber analytics to proactively highlight risks and identify, monitor and address threats. As enterprises bolster their security defenses, predictive analytics play an increasingly important role. Enterprises can conduct sophisticated correlations to detect advanced persistent threats while implementing IT governance and automated enterprise risk processes — critical building blocks for enabling security intelligence. It includes the ability to identify previous breach patterns and outside threats to predict potential areas of attack, analyze insider behavior to identify patterns of potential misuse and monitor the external environment for potential security threats. Continuous monitoring, when combined with cyber The road to cyber intelligence 30 June 15, 2016 FCW.COM DrillDown Federal cybersecurity leaders can move from a basic to an optimized level of security intelligence by advancing their activities in four areas. PEOPLE DATA APPLICATIONS INFRASTRUCTURE Optimized Governance, risk and compliance Advanced correlation and deep analysis • Role-based analytics • Privileged user control • Data flow analytics • Data governance • Secure application development • Fraud detection • Advanced network monitoring/forensics • Secure systems Proficient • Identity management • Strong authentication • Activity monitoring • Data loss prevention • Application firewall • Source code scanning • Asset management • Endpoint/network security management Basic • Passwords and user IDs • Encryption • Access control • Vulnerability scanning • Perimeter security • Antivirus SECURITYINTELLIGENCE 0615fcw_029-031.indd 30 5/20/16 10:52 AM
May 30, 2016
June 30, 2016