by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : December 2013
DrillDown 3. Federal security leaders could achieve more with less. In an era of budget austerity, consolidating physi- cal and cybersecurity systems under the purview of federal IT offers many bene ts. From a technology investment standpoint, the drivers behind the tools are interconnected. As a result, most security management systems, tools and processes can be modernized to interoperate with new and existing systems quickly and cost-effectively. Security personnel could avoid the potential for labor-intensive controls and processes related to monitoring, managing and reporting physical securi- ty data by adopting the same computer- based efficiencies established for cybersecurity disciplines. Furthermore, security consolida- tion supports several of the objec- tives set forth in U.S. CIO Steven Van- Roekel s report on scal 2014 budget priorities for federal IT. Consolidation increases technology s total return on investment, capitalizes on innovative technologies and processes to achieve department and mission objectives, and uses data analytics to make more informed strategy and process deci- sions. In fact, adding physical security to federal IT s responsibilities would expand its purview and budget power. 4. Critics of convergence forget that change is inevitable. Some security stakeholders might oppose converging security because it could translate into an overhaul of organi- zational hierarchies, job titles and qualifications, and regulatory over- sight. In reality, federal agencies have successfully completed similar transi- tions in the past. The best example is the FBI s transition in the 1980s, when the advent of computers unleashed a new breed of criminals whose crimes required investigators who were skilled in technical forensics. Some agency veterans resisted the new roles. Ulti- mately, the organizational shift hap- pened --- because it had to happen --- and was carried out gradually. Similar to the new face of an FBI agent, the federal security manager of the future will have knowledge of both physical and cybersecurity principles and practices, and will apply security solutions that hunt for uni ed threats. The control systems that he or she uses will report events in real time and apply actions across all applicable control systems in a proactive response, all with clear and manageable human oversight and control. In the end, the security bene ts and ROI of adopting a uni ed security pro- gram far outweigh the initial discom- fort and investment in transforming the security organization. ■ Vic Berger is principal technologist at Af gent. 32 December 2013 FCW.COM NETWORK OPTIMIZATION: Networks in Motion Special Report TOPICS INCLUDE: ONLINE REPORT SPONSORED BY BROCADE TO LEARN MORE, VISIT: FCW.COM/2013OPTIMIZETHENET SOARING DEMAND PUSHES NETWORK OPTIMIZATION NEEDS WAN OPTIMIZATION GETS A CLOSER LOOK OPTIMIZATION AND SECURITY: A TRICKY COMBINATION NETWORK OPTIMIZATION KEY TO CLOUD TRANSITION SDN COULD BE OPTIMIZING WAY OF THE FUTURE
November 30, 2013