by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : January 2013
January 2013 FCW.COM 27 to build cyber capabilities. The ranks and capabilities of the edgling Cyber Command are lling out, and its leaders are determining the evolving requirements for the Pentagon s newest domain: cyberspace. In 2013, training will likely be a top priority as a new gen- eration of military personnel sharpens much-needed cyber skills, and cybersecurity will be an area of budgetary excep- tion, unlikely to face the ax as much as other DOD programs. "The demand signal has increased and will continue to increase," said Lt. Gen. Michael Basla, the Air Force s CIO. "Why is that? Because the threat is out there. It s not just a Department of Defense thing. It s a national imperative that we must protect our country against the cyber threats. We have to address how to respond to that demand signal." Cybersecurity should not be subject to budget cuts and, indeed, could be one of a few growth areas in the age of scarce funding, Basla said. "Cyber is integrated across all our capabilities and everything we do as a nation," he said. "We need to be prepared for that." ID MANAGEMENT SECURITY CONCERNS DRIVE PROGRESS Slowly but surely, progress is being made on the creation of online identi cation and authentication systems that will meet the needs of federal agencies and commercial entities. That progress is a result of the Obama administration s National Strategy for Trusted Identities in Cyberspace (NSTIC), which launched in April 2011. NSTIC s recently formed Identity Ecosystem Steering Group, which is feder- ally funded but led by the private sector, is seeking to set standards for identity management systems across multiple platforms. After the group gathered for a second time in December 2012, Aaron Titus, chief privacy of cer at Identity Finder and the group s Management Council delegate for privacy and civil liberties, said its preliminary progress in develop- ing standards and use cases is promising. In the past year, NSTIC has developed a standard identity management scheme that consists of seven requirements. It recently conducted three pilot projects to test privacy- enhancing cryptography and two projects that use non- cryptographic privacy features; it plans to analyze the results in the coming year. "That s where the ID world is going right now --- toward identity ecosystems," Titus said. In such an ecosystem, a person who logs onto a social media site or online bank account would be authenticated by a trusted identity provider in accordance with NSTIC s seven requirements, while the user s privacy remains protected. Roadblocks include the cost for providers and inconve- nience for users, but Titus said the increase in the incidence and cost of identity theft --- for individuals and businesses --- could be a powerful motivator for speeding up the process. "It is easier than ever to commit ID theft," Titus said. And as users online identities become more interconnected, the ease with which a criminal can turn a hacked Face- book account into control over a user s bank accounts is on the rise. Accordingly, organizations are beginning to realize that basic credentials such as passwords aren t secure enough anymore, said Ray Wizbowski, vice president of strategic marketing at Gemalto. "If you take a step back and look at what is happening with NSTIC, there is a mass movement across even social networking sites away from basic credentials to secure credentials," Wizbowski said. "That is the mega-trend for the next year." Tom Flynn, vice president of online authentication at Gemalto North America, said 2013 will likely see federal agencies move toward digital data control, with biometrics and cryptographic authentication likely methods that could drive federal policy. "The process of vetting IDs is going to evolve," Flynn said. "The way things are moving, you will see organiza- tions ramping up funding for proper technology in doors, networks and mobile devices." Mobile technology will be less of an afterthought in ID management in 2013, he added, noting that "mobile as an authenticator [and] mobile as a derived credential holder" are conversations that are already happening. The question that many would like to see answered in 2013 is whether federal agencies will lead or follow the commercial world in terms of ID management. How the federal government gets involved in privacy and security standards and requirements will be a key factor in what happens in the coming year in ID management. ■ "I THINK WE'LL SEE SOME LEGISLATION COMING OUT OF CONGRESS THIS YEAR.... THE HARD PART WILL CONTINUE TO BE HOW MUCH TO REGULATE VERSUS INCENTIVIZE." --- CHARLES CROOM, LOCKHEED MARTIN