by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : October 30, 2012
October 30, 2012 FCW.COM 9 CRITICAL READ WHAT: A report from the Department of Homeland Security s Task Force on CyberSkills that outlines 11 recommendations for improving DHS recruitment and retention of cybersecurity talent. WHY: DHS formed the task force to address the rising threat of cyberattacks against defense and civilian agencies. The task force s recommendations are divided among ve objectives, including how to make working for DHS more desirable than working in the private sector or at other agencies. According to the authors, the report s recommendations will help ful ll DHS Secretary Janet Napolitano s goal of ensuring that federal agencies and the private sector "will have the technical cybersecurity workforce needed to meet their mission responsibilities. " VERBATIM: "Recommendation 5: Make the hiring process smooth and supportive and make mission-critical cybersecurity jobs for the federal civilian workforce enticing in every dimension: in mission and service, skills, growth potential, and 'total value proposition. '" FULL REPORT: DHS.gov Data leaks: An inside job Despite all the buzz about cyber war these days, a recent MeriTalk survey of federal information security professionals found that unauthorized data is slipping past agency defenses mainly via e-mail. Some cases may re ect sinister intentions, but careless employees seem to be a more signi cant risk for agencies. How unauthorized data leaves federal agencies STANDARD WORK E-MAIL 48% AGENCY-ISSUED MOBILE DEVICES 47% USB FLASH DRIVES 40% PERSONAL E-MAIL 38% PERSONAL MOBILE DEVICES 33% WEB-BASED WORK E-MAIL 23% A new report on big data urges federal agencies to start small but start now and calls for the creation of a chief data of cer position at each agency and also governmentwide. "Demystifying Big Data," released Oct. 3 by the TechAmerica Founda- tion, attempts to de ne big data and its value, and offers 10 case studies to illustrate how big-data projects can serve criti- cal government missions. Half of those examples showcased federal projects. Government has been at the forefront of cre- ating and sharing big data, said SAP s Steve Lucas, global executive vice president of SAP s Database and Technology division and co-chairman of TechAmerica s Federal Big Data Commission. "If you think about what we take for granted today --- popula- tion data, weather data...we have the federal government to thank for it," he said. And now, with agencies shar- ing thousands of datasets and the cost of storage and analysis plummeting, "you ve got almost a perfect conver- gence [for putting the data to use]. It is not a research experiment. This is something anyone can tackle today." The report urges agencies to identify two to four key business or mission requirements that big data can address and craft projects to meet those needs instead of attempting to implement a comprehensive big data strategy. Regarding the report s call for yet another C-level role at agencies, Lucas said big data warrants a dedi- cated champion, and CIOs and chief technology of - cers often don t have the time or the appropriate focus for big data projects. "The reality is, if you re a CIO and you re really delivering information to your business...then maybe you get a pass," he said. "But we ve [too often] moved from a focus on the information to just the technology." Industry to agencies: Start small with big data computers were rendered useless by the Shamoon virus, which Defense Secretary Leon Panetta called the most destructive attack yet on the private sector. 30,000
October 15, 2012
November 15, 2012