Insider Threat programs across all agencies must develop alongside technology, the GAO reports. However, the Department of Defense is making significant progress.
Defense information pro Paul DeMennato offers advice about protecting informational systems against insider threats. He said it’s more than keeping up to date on patches and monitoring files for human anomalies, it’s about getting your staff to buy in to a culture of protecting against insider attacks.
IBM has claimed 60 percent of all intrusions can be attributed to insider threat. Further, Information Week suggests that 95 percent of all organizations have employees who seek to bypass security controls.
The OCC uses bank statement data, loan level data, financial market data, economic and legal data to provide the government with both holistic, macroeconomic views and the ability to dive deep into a particular subject.
When you try to make sense of the petabytes of data flowing across your desk you really don’t know what has value. There aren’t enough hours in the day to carefully parse each data set you have responsibility for. The most practical approach is to add some kind of a tool to automate the process.
The Substance Abuse and Mental Health Administration collects data using various methods and sources to identify trends and patterns in the well-being of the American public.
The Food and Drug Administration is saving time on cyber incident responses by integrating its watch desk and engineers within a single command center, and integrating its tools to provide more holistic views of its systems.
The General Services Administration’s Federal Acquisition Service just created the Highly Adaptive Cybersecurity Services Special Item Number (HACSSIN) to add cyber services to GSA’s Schedule 70 to help agencies procure cyber solutions.
The Homeland Security Department’s National Cybersecurity and Communications Integration Center is using new automation technologies to flip the script on script kiddies and black-hat hackers by getting proactive about cyber defense.
Palo Alto Networks Chief Security Officer Rick Howard said automation is key to detecting and preventing attacks – and maintaining a healthy network
Agencies are under the gun to meet the Dec. 31 deadline to manage all permanent and temporary email in an accessible, electronic format. Earlier this year, agencies said they were in good shape to meet that requirement.
The Justice Department’s Office of Information Policy is constantly fighting an uphill battle to improve federal agencies’ responses to FOIA requests.
FBI Chief Information Officer Gordon Bitko said there’s nothing wrong with technology-driven innovations that help employees perform their missions. The problem is the lack of coordination from on high.
Joe Klimavicz, Justice Department chief information officer, is moving DoJ to a Microsoft 365 cloud-based solution to ensure its various components can communicate effectively.
The Defense Department is having a particularly tough time integrating mobile technology into its mission, largely because every attempt to link it to the Common-Access-Card has been too cumbersome. But DISA’s Purebred program may have found a way to bypass the CAC altogether.