by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : July 30, 2014
Increased connectivity has transformed and improved access to government. Citizens today can connect with govern- ment agencies and leaders in ways that were unimaginable just a few years ago. That connectivity, however, has increased the importance and complex- ity of our shared risk. Ever-increasing cyberattacks on federal government networks are growing more sophisti- cated, aggressive and dynamic. Because the government continually provides essential services to the public, agen- cies must safeguard information from theft and protect networks and systems from attacks while preserving individu- al privacy, civil rights and civil liberties. To provide effective and efficient information for citizens and businesses in real time, agencies are taking advan- tage of applications that allow ongo- ing visibility into threats, vulnerabilities and incidents on their networks. The government’s use of these applications is central to the Department of Home- land Security’s Continuous Diagnostics and Mitigation program — a dynamic approach to fortifying the cybersecurity of computer networks and systems. The CDM program provides capabili- ties and tools that enable administra- tors to see the state of their networks at any given time, understand the risks and threats, and identify and mitigate flaws at near-network speed. DHS established the CDM program to support government efforts to pro- vide adequate risk-based and cost- effective cybersecurity. CDM — which is also available to state, local and tribal government entities — provides stake- holders with the tools they need to pro- tect their networks and enhance their ability to identify and mitigate cyber threats. It also offers a path to greater intelligence about enterprise security. In addition, CDM complements the risk-based approach to security that agencies can use to ensure a compre- hensive program that enables missions while effectively safeguarding assets, relying on National Institute of Stan- dards and Technology guidance for implementation across a broad range of agency activities. Even with strong efforts across the government, the Government Account- DHS’ Continuous Diagnostics and Mitigation program is set to play a central role in reducing risk CDM: Taking enterprise security to the next level BY JOHN LAINHART AND DAN CHENOK July 30, 2014 FCW.COM 31 DrillDown Basic Organizations employ perimeter protection, which regulates access and feeds manual reporting. Optimized Organizations use predictive and automated security analytics and leverage security to drive competitive advantage. MANUALAUTOMATED REACTIVE PROACTIVE Proficient Security is layered into the IT fabric and business operations. Security intelligence Accelerating the move to security intelligence
July 15, 2014
August 15, 2014