by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2016
Creating the Department of Home- land Security involved reorganizing agencies based on their technology resources and workforce expertise into a super-agency capable of mounting operations against terrorism, an effort that would ultimately absorb 22 agen- cies and 170,000 federal workers at an annual cost of $37.2 billion. An early qualification for participat- ing agencies was having the tools and capabilities to help build a strong back- bone for nationwide sharing of infor- mation and services. DHS officials, for example, explored using the U.S. Cus- toms Service’s Automated Commercial Environment to connect agencies via unified networking features. ACE was designed to put Customs’ systems on one network that linked entry points at U.S. borders and ports. It provided a way to strengthen border security by improving the collection, sharing and processing of $1 trillion in annual imports and exports. Those features made ACE a candi- date for use in a Transportation Security Administration project designed to screen passenger lists and manifests from inter- national flights for irregularities. As tools like those expanded to fill in gaps in the federal government’s defen- sive perimeter, DHS’ cybersecurity war chest grew with it. The Einstein program, established in 2004, was an early intrusion-detection system that monitored agency network gateways for unauthorized traffic. A sec- ond version, developed with the U.S. Computer Emergency Readiness Team, helped collect traffic flow in real time and scanned it for malicious code. Einstein gave way to more sophisti- cated security tools that are being used to the present day to manage federal net- works, including DHS’ Continuous Diag- nostics and Mitigation (CDM) program. With more sensor capacity, auto- mated data collection and managed risk alerts, the CDM program has equipped agency network managers with dash- boards that flag and prioritize the seri- ousness of threats based on a risk-scor- ing system. The concentration of tools and poli- cies gave DHS the ability to rise to sev- eral recent challenges, including the Federal Risk and Authorization Man- agement Program for cloud security and a “cyber sprint” ordered by U.S. CIO Tony Scott after the massive Office of Personnel Management data breaches in 2015. n September 15, 2016 FCW.COM 21 NOVEMBER 2002 THE CREATION OF DHS When President George W. Bush signed the Homeland Security Act in 2002, government IT leaders and policymakers went to work on a grand plan to transform a hodgepodge of select civilian agencies into an IT-powered defensive force. NOAANEWS.NOAA.GOVAPIMAGES In November 2002, then-President George W. Bush signed a bill into law creating a Cabinet-level Department of Homeland Security. 0915fcw_014-022.indd 21 8/23/16 9:33 AM
August 30, 2016
September 30, 2016