by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : November and December 2016
A s recently as just a few years ago, government agencies were able to stem the tide of insider threats by improving background checks, locking down external media like USB drives, and minimizing the use of personal mobile devices at work. While these techniques are still viable, they are not enough to prevent the growing threat posed by insider threats. Today, there are more connected devices than ever before. Everything from refrigerators and smoke detectors to health bands and lighting are part of a vast interconnected network—with more devices on the way. Gartner predicts nearly 21 billion connected devices worldwide by 2020.1 That doesn’t even include smartphones, tablets, and computers. While these devices bring exciting new capabilities, they also represent new network access points—and a huge threat to the network and everything on it. Agencies will have to continuously monitor these devices because they create new attack vectors for hackers, both from within and outside the organization. In addition to the threats posed by expanding networks, hackers are evolving and innovating. Hacking has become a big business and stealthy threat actors have grown much more capable of infiltrating modern networks. While external hacking remains a significant concern, insider threats comprise a significant percentage of all cyber issues. Three out of 10 cyberattacks and breaches are caused by insiders.2 Despite the pervasiveness of insider threats, nearly one-third of organizations have no effective way to prevent or deter them.3 The U.S. government clearly understands the importance of thwarting insider threats. In addition to its 2011 executive order establishing the National Insider Threat Task Force, the OMB recently issued the Cybersecurity Strategy and Implementation Plan. This plan includes bolstering efforts against insider threats. The Pentagon’s Defense Security Service has also taken steps requiring contractors to implement programs to identify, deter, and mitigate insider threats. And it’s starting to make a difference. More than 75 percent of federal respondents are now more focused on fighting insider threats today than they were a year ago, and more Shutterstock.com Detect and Deter Insider Threats: A Before, During and After Approach 1 Gartner, Forecast Analysis: Internet of Things – Endpoints, Worldwide, December 2015 2 PwC, The Global State of Information Secu- rity Survey 2015, September 2014 3 SANS Institute, Insider Threats and the Need for Fast and Directed Response, April 2015 SPECIAL REPORT CYBERSECURITY: INSIDER THREATS Sponsored Content
January and February 2017