Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Analysis: Savings from going mobile can't come at cost of security
Monday - 2/27/2012, 11:06am EST
"It would seem on the surface of it — and there's no finger point here — that they [the Air Force] probably should've done a little more research before that initial procurement notice went out," said Tony Busseri, CEO of Route 1, in an interview with The Federal Drive with Tom Temin.
This recent episode is a warning for other agencies to not rush into going mobile with first ensuring "we're not creating greater compromises to our network security," Busseri said.
The government's adoption of mobile devices is only in its early stages — "the first inning in a nine-inning ball game," as Busseri put it. People hear about "wonderful, sexy new tools that are available for individuals, and we ask the question of ourselves, 'Why can't they be available in a working setting within government or industry?'" he said.
Homeland Security Presidential Directive 12, or HSPD-12, set the standard for authenticating people accessing data. With tablets, agencies are still struggling with HSPD-12 compliance, Busseri said.
"If you don't know who's using the data, you're opening yourself up to a lot of issues ... and the simple security principle is you have to authenticate the individual so you know what entitlements or access they should have," he said.
Even with the inclusion of mobile devices, agencies must figure out how to maintain that data behind a firewall, he added.
"Anytime we extract data outside of the firewall, we're increasing additional vulnerabilities, not just of where that data's going and who's using it, but we're opening holes in that fortress wall and potentially letting some nasty things to come in," he said.
As federal budgets are squeezed, Busseri reminds agencies to "challenge ourselves that the paradigm that says 'Better security is going to be more cost' is not accurate."