by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : July 30, 2014
ability Office and inspector general offices report that security continues to be a challenge for federal agencies. That reinforces the strong support across the government for CDM and its call for more automated and proac- tive approaches to controlling and pro- tecting data and systems, which agen- cies and their component levels need to accelerate their move to enterprise security intelligence. CDM enables agencies to move from a reactive manual approach, which relies on often-heroic human actions to protect federal data and systems, to one of predictive and automated security analytics. With CDM in place, data and systems are protected by automated decision-making and the ability to make sound security deci- sions based on risk, vulnerabilities and consequences. A holistic, intelligent approach to security that helps organizations combat the increase of cyberattacks, insider threats and advanced persistent threats provides the enterprise secu- rity that most organizations have found elusive to date. This approach relies on an architecture for security intel- ligence operations that complies with the increase in mandates and federal regulations. Such an effort also cor- relates assets, threats and vulnerabili- ties to create situational awareness for sound risk management decisions. To implement this approach, agen- cies will benefit from solutions that can efficiently process billions of events from multiple devices and transform them into actionable incidents based on risk and threat analysis. By doing so, enterprises can actively and accurately predict, prevent, react to and remedi- ate security risks in their organization, ultimately achieving a more intelligent approach to managing security that automates and streamlines systems and security management to lower the total cost of managing and secur- ing IT assets. This enterprise strategy for security makes new technologies, such as cloud and mobile, more secure — especially when coupled with agency actions to assess their security posture, develop a strategy, design a strategic architec- ture, implement security and privacy controls, and manage the solutions. As this real-time, CDM approach matures and is integrated with risk- based management, agencies will be able to more effectively address the challenges of securing their people, data, applications, transactions and infrastructure. ■ John Lainhart leads IBM’s Public Sector Cybersecurity and Privacy Services, and Dan Chenok is executive director of the IBM Center for the Business of Government. 32 July 30, 2014 FCW.COM DrillDown Join this discussion on best practices and lessons learned from HHS that can help your agency build effective collaboration strategies. • How to make the jump from collaboration to information sharing. • How to advance cloud-based collaboration through content sharing. • And much more! Speaker: Jennifer Gray, Lead Cloud Enterprise Architect in the Office of Strategic Planning and Governance at the U.S. Department of Health and Human Services REGISTER NOW AT: www.fcw.com/CloudCollaboration BROUGHT TO YOU BY SPONSORED BY Collaboration in the Cloud FREE ON DEMAND WEBCAST
July 15, 2014
August 15, 2014