Paul Strassmann continues from last week's "Gentlemen Do Not Open Attachments" with illustrations of how to implement safe social computing using virtual computers.
"At the end of the day, it's about the warfighter."--Lt. Gen. Dennis Vis, USA, director, C4 systems, Joint Staff
"A lot of our warfare in the future is going to be electronic. Our enemies are going to try to take us down either through our Defense Department systems or through other systems."--Lisa N. Wolford, founder, president and CEO of CSSS.NET
"Stop pontificating about the rules and be an example." --Marc Sachs Verizon says to goverment agencies about cybersecurity practices
No, I'm not talking about the classic Marilyn Monroe film; I'm talking about AFCEA's Homeland Security Conference, going on this Wednesday and Thursday. The theme is "DHS: The 7-Year Itch-Renewing the Commitment." The event will cover such topics as cybersecurity, securing social media, transparency, identity management, information and intelligence sharing, and more.
"Ignorance is our biggest vulnerability [in the cyber domain]." --Vice Adm. Carl Mauney, USN, deputy CO, STRATCOM
Although the U.S. Navy has been in the cyber arena for many years, today the service officially moved into the operational cyber domain as Vice Adm. Barry McCullough, USN, took command of the U.S. Fleet Cyber Command/U.S. 10th Fleet.
Cyber denizens meet on DEFStar-an innovative social media site geared toward government and military.
President Obama has named Howard A. Schmidt the new White House Cybersecurity Coordinator.
The DHS has instituted a new job application process for cybersecurity positions. The good news? It's free of KSAs. Right now the agency is hosting a virtual job fair for those interested. Applicants no longer have to worry about KSAs or a points system; they simply submit cover letters and résumés, which are reviewed by hiring managers. DHS officials will then contact candidates of interest to invite them to a private interview event.
February may seem far away, but it will be here in no time at all. Make plans now to attend two great events: the West 2010 Conference in San Diego and the Homeland Security Conference in Washington, D.C.
Two leaders in the intelligence realm shared their main concerns about security and cyberspace to a packed auditorium at the SOLUTIONS Series.
Tracks panelists at SOLUTIONS discuss the foundational issues, current initiatives and long-term plans for cybersecurity.
Sherri Ramsay, director of the NSA's Central Security Service Threat Operations Center, says that the intersection of cyber, national and economic security has changed the way her organization interacts with industry.
The information technology arena is experiencing large tectonic shifts that are directly affecting requirements for cybersecurity. Transitions-from physical to virtual; from the premise to the cloud; from more formal networks to social networks-will have their counterparts in new security requirements and approaches.
Government needs to "think flat' and create a cybersecurity architecture that emphasizes a peering structure rather than a vertical architecture.
Joe Mazzafro, writing over at the MAZZ-INT blog for the AFCEA Intelligence community, explores the difficulty in finding a person who is both qualified and willing to be the new "Cyber Czar." "Given these circumstances I just don't see many high profile personalities attracted to being the third or fourth choice for a position that lacks authority, reports to a Deputy National Security Adviser and must operate in the shadow of DIRNSA," he writes.
Next in SIGNAL's webinar series, "Securing the Data Center: A DOD Architecture for Information Assurance" will take place on May 7, 2009 at 11:00 AM ET. Targeted attacks by hackers and insiders are aimed where they'll do the most damage and where the most valuable assets are located - the agency data center. Government agencies can increase protection and reduce operational costs when security issues are considered at the very beginning of data center planning. So it's ironic that data center security is often an afterthought.