by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : November 15, 2012
8 November 15, 2012 FCW.COM Trending INK TANK Homeland Security Secretary Janet Napolitano said work continues on an executive order to address cybersecu- rity issues, but President Barack Obama has not yet seen it. "There s been work on the EO in light of Congress failure to pass legislation this past year, in part because we recognize that given the severity and urgency of the sit- uation, we can t sim- ply wait if Congress cannot act," Napoli- tano said at an Octo- ber event on diversity in the cybersecu- rity workforce produced by the Center for Strategic and International Studies. "So there is a draft, it has been circu- lated, but the president has not had the opportunity to review it or make a nal decision about it." The election was keeping the presi- dent occupied, she said, and the details of the order were still being hammered out by a variety of interested parties. "One of the things happening now is outreach into the private sector and with other stakeholders to look at it and get some feedback before any EO would be issued --- if, ultimately, there is that decision to go by executive order," she said. Napolitano expressed hope that Congress could still step in with more comprehensive cybersecurity legisla- tion, which would go further than any steps offered by an executive order. "The Senate majority leader, Sen. [Harry] Reid, has indicated that he s very interested in trying again in cyber. We ll have to wait and see when the Con- gress comes back" in November, she said. "They have a long list of things that need to be dealt with. But again, myhope---andtheidealway---isto go through Congress. But if Congress cannot act, then the executive branch is going to have to." Napolitano vows to act on cybersecurity One would think that by now agencies would be warming up to the notion of allowing employees to bring the mobile devices of their choice into their working lives --- a concept com- monly called "bring your own device" or BYOD --- but many agencies con- tinue to resist the idea. Not surprisingly, some of the government organiza- tions hesitant to adopt BYOD include parts of the Defense Department and intelligence community, where the prev- alence of highly sensitive, classi ed data makes leaders think twice about opening up anytime, anyplace access. "BYOD is something I think we aspire to...but for an organization of our scale, this is something that s hard to address. We currently have upwards of 400,000 devices in the Department of Defense," DOD Deputy CIO Rob Carey said at 1105 Media s Cybersecu- rity Conference in October. Managing so many devices and systems means BYOD ASAP? Not so fast. that logistics, support, legalities and privacy are already hard problems to solve, without the added complexity of employee-owned devices. In addition to the obvious security concerns, BYOD also raises serious questions about how of cials should handle mishaps that already have well-established protocols for government-issued tools. "In today s environment, we occasionally have some- thing called a spillage," which is when information breaches classi cation levels, said Debo- ra Plunkett, information assur- ance director at the National Security Agency. "The procedures for dealing with it are to remove the device, and depending on where the device is in the ecosystem, sometimes you have to destroy the device. Imagine how that would work in BYOD where I d have to say, 'Oops, I need your phone, and you can t have it back ? That s a whole different scenario." Rob Carey Continued on Page 10 ONE job listing for "data scientist" on USAJobs as of Oct. 31. (A GS-12 position at NIH.)
October 30, 2012
November 30, 2012