by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : August 30, 2013
August 30, 2013 FCW.COM 21 DRAGUTIN CVIJANOVIC critical infrastructure communities and working together at building this out is one way to meet requirements laid out in that framework. I can easily envision as the frame- work solidifies, the NCCOE being able to work with the build-out of functions and categories, based on standards, with different critical infra- structure communities --- also, as we see additional gap areas, being able to work with them on those gaps, under- standing what they are and what the requirements look like. Then that gets fed back into NIST and the standards bodies. So you can see an evolution of stan- dards and best practices that drive the center. Then the center identi es where we need more work, and that drives back the standards and best practices we need on a national and international basis. The cybersecurity workforce has been a big issue, both in the execu- tive order and in subsequent direc- tives. For example, agencies have been directed to take stock of their in-house capabilities. What role does the center play in help- ing agencies address those work- force issues? Dodson: I think as you re working from business requirements down to cybersecurity platforms, you begin to understand the life cycle of that platform, what you need to build and maintain it, what your users need to be doing. So it informs the workforce and helps validate the types of competen- cies that they ve identi ed and how well they t in the technology space. We work with the business owners, who are working to meet different legal and policy challenges as they put this into play. So understanding those chal- lenges from a workforce perspective and management perspective is equally as important as the bits and bytes folks. NIST spends more time with the bits and bytes folks...but we re working to bring more students into the cen- ter so we can take advantage of their expertise and capabilities, and they can learn more about cybersecurity from that practical perspective and what it means to build it out. Those kinds of students [include] engineers and computer scientists, but also sociologists and cognitive scien- tists who help us understand how we interact with technology. The end-user aspect can t be under- played in addressing our cybersecurity challenges. You have to provide tools and techniques that make it easy to do the right thing and hard to do the wrong thing. The center, NIST s National Initia- tive for Cybersecurity Education and the executive order all come together to create that culture of cybersecurity that we need in organizations. ■ Where do we need innovation to grow to meet the demands where the technology isn't up to where it should be? That's really the heart and soul of what we're trying to do.
August 15, 2013
September 15, 2013