by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : March 15, 2013
In his recent executive order on cyber- security, President Barack Obama high- lighted information sharing among government, industry and other stake- holders as crucial to cybersecurity. In particular, the order mandates the expansion of the Enhanced Cyberse- curity Services program. When it was launched in 2011 as the Defense Industrial Base Cyber Pilot, the effort involved fewer than a dozen defense contractors testing ways for the gov- ernment to share attack signatures for identifying threats to defense contrac- tors networks. The pilot later expanded to include more companies, and in 2012, the Department of Homeland Security took over essential communications with Internet service providers. Now the program is being enlarged governmentwide to better secure the networks of agencies and private com- panies, including those that manage critical infrastructure, against cyber- borne threats. "The initial impetus in the DIB Cyber Pilot was a proof of concept," said Wil- liam Lynn, former deputy secretary of defense and now CEO of DRS Tech- nologies. "It was to show there could be a public/private partnership and that we could get through the policy and legal thickets to allow this information sharing." The original pilot program focused on government agencies within the Defense Department and the intelli- gence community sharing threat sig- natures with participating companies. The program was criticized for relying too heavily on signature-based defenses, which can be of limited effectiveness and are only one of many tools that should be used. "It wasn t as big of a game-changer for some of the larger companies, which had cyber capabilities of their own, as it might have been for smaller compa- nies with less capable defenses," Lynn said. "And that s where...the president s executive order is taking it." Current laws do not always ensure information sharing because they fail to adequately protect companies. In a Feb. 14 blog post, the Heritage Foundation s Paul Rosenzweig and David Inserra said that the executive order cannot over- come those limitations. "While the EO does take some posi- tive steps in the area of information sharing, these steps are hamstrung by the EO s inability to provide critical incentives such as liability protection," they wrote. "The problem is that the EO cannot provide these important pro- tections. They can be created only by Congress. As a result, many businesses will be reluctant to share their infor- mation for fear that their proprietary information could be endangered by a [Freedom of Information Act] request or that an honest mistake might lead to a lawsuit being led against them." --- Amber Corrin Cybersecurity order widens DOD info-sharing program March 15, 2013 FCW.COM 9 CRITICAL READ WHAT: A policy brief from the Center for a New American Security that outlines reasons for policy-makers to provide guidance on active cyber defense. WHY: ACD, which refers to the range of actions taken to engage an adversary before and during a cyber incident, can improve efforts to prevent, detect and respond to sophisticated attacks, said author Irving Lachow, director of the center's Program on Technology and U.S. National Security. The document explains why ACD is needed and what constitutes the cyber engagement zone, and it urges lawmakers to develop a framework for ACD initiatives to clarify what actions companies and agencies can legally take to defend themselves. VERBATIM: "Only 6 percent of organizations detect advanced attackers via internal methods. Targeted attacks continue to evade preventive defenses. During 2011, the vast majority of targeted organizations --- 94 percent --- learned that they were victims of cyberattacks from an external entity such as law enforcement." FULL REPORT: CNAS.org An award f cyber warr The Defense Depar created a new Disti Warfare Medal for "extraordinary achi not involving acts of valor, directly impacting combat operations or other military operations Cyber warfare personnel and dron pilots are among th who would be eligible. Although DOD of cials stressed that the military's highest decorations are reserved for those who put their lives on the line, some have criticized the award for being placed higher in the hierarchy of military honors than the Bronze Star and Purple Heart. --- Troy K. Schneider for riors tment has inguished ievement, r ." " ne hose days is the average time to process Veterans Bene ts Administration claims --- a 17.7 percent increase despite efforts to streamline the system. 272.5
March 30, 2013