"The country really needs NIST to be responsive," Gallagher said in an interview. "There are a lot of ways doing that, and one of those tools is management structure."
No question, the information security professional's role has evolved in recent years. How, then, has the need for ongoing professional education also changed? And what role must risk management play in today's security organization?
In an exclusive interview, Mark Lobel of PricewaterhouseCoopers and ISACA,...
Back in the 1950s, not too many years removed from World War II, Dickie George was in grade school, and he recalled drills in which pupils hid under their classroom desks in preparation for a bombing attack. Then, he said, people understood threats.
"In today's cyber world, cyber is so much more complicated than a...
As America's networked systems' gaping security hole widens, the number of actors who can exploit computers for illegal, harmful and devastating purposes continues to rise, writes a leading FBI cybersecurity official.
For decades from the inside, and now from the outside, Ruby DeMesme has seen the role of the federal government worker evolve over the years.
The former Air Force assistant secretary for manpower, reserve affairs, installation and environment sees information technology as shaping the way government workers perform...
We've experienced two waves of the H1N1 pandemic. What lessons have we learned?
Sue Kerr, President of Continuity First, a business continuity/disaster recovery consultancy, talks about how organizations have handled H1N1. She also discusses:
the state of BC/DR;
Challenges facing organizations today;
2010...
As the government adds new applications to its information systems, the more openings it creates for attackers to gain access, creating a continuing battle between IT security professionals charged with safeguarding the systems and those seeking to cause them damage.
"The more functionality that's there, the more...
The Department of Homeland Security launches a aimed to furnish stakeholders and the public with easy accessible information in securing the nation's critical infrastructures and key resources.
Congress enacted the current law when the Net was a mere babe used by a few university researchers and military strategists, and decades before multimedia bells and whistles were added to make it today's primary communications channel.
FaceBook, Twitter, LinkedIn -- Social-networking sites are now used both as recruitment tools for new talent and as screening sites for potential employees. As such, information security professionals should be careful to cultivate the right image on these and other popular sites.
Development of competency models that would lead to IT security occupational classifications are deemed a high priority for the federal government as demand for cybersecurity professionals grows.
The National Institute of Standards and Technology characterizes its new guidance released this past week as transformational, and no one can speak more authoritative about it than Ron Ross, NIST's highly regarded senior computer scientist, information security researcher and FISMA implementation project leader who...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.