Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: risk management
Joanne Woytek, program manager of the NASA SEWP program joins host Roger Waldron to talk about the contract and the implementation of SEWP 5.
May 21, 2013
On this week's Bloomberg Government Capital Impact show, analysts will discuss the mass shooting at an elementary school in Newtown Connecticut. They will also talk about how President Obama plans to respond to the tragedy, and the impact that response will have on the gun lobby.
December 20, 2012
The agency developed a playbook to help officials keep their processes and procedures unpredictable. Deputy Administrator John Halinski said TSA is using a risk-management approach to protecting transportation systems. GAO said DHS as a whole is doing a better job using risk to make decisions.
On this week's Bloomberg Government Capital Impact show, analysts examine the automatic budget cuts known as sequestration, risk-management for companies in the wake of Hurricane Sandy and the economics behind your Thanksgiving dinner.
On this week's Bloomberg Government Capital Impact show, analysts will talk about cybersecurity and risk managment.
October 18, 2012
Tags: acquisition , Bloomberg Government , Capital Impact , cybersecurity , Cybersecurity Act of 2012 , Afzal Bari , Jason Wilson , Kiersten Todt Coon , Liberty Group Ventures LLC , cyber attacks , Allen Scott
A recent paper from Crowe Horwath, LLP, outlines how risk management could help you better manage your projects.
IT security also to be worked into federal segment architecture methodology
Testimony obtained by FederalNewsRadio says IT security measurements focus too much on compliance and not on risk. GAO surveyed 24 agencies and found few have moved beyond just fulfilling FISMA requirements.
Tags: technology , Greg Wilshusen , Vivek Kundra , John Streufert , GAO , OMB , State Department , Senate Homeland Security and Governmental Affairs , NIST , Tom Davis , Deloitte , cybersecurity , FISMA ,
Updated 800-53 publication expected by July 31
The National Institute of Standards and Technology's (NIST) recent release of Special Publication 800-37, Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach is an important change in the direction of how federal agencies achieve information security and manage information system-related security risks. It shifts the focus away from a point in time Certification and Accreditation (C&A) approach to compliance towards continually assessing risk and security authorization. As a result, the federal information security community is sending a message to the broader federal community and creating an important discussion: the cyber threat is real and must be addressed in the context of its potential impact on an organization. Cyber security is not as simple as a "check the box" requirement. The paradigm shift away from point in time security and towards obtaining situational awareness of the organization's risk posture must be as pervasive in the federal government as the cyber threats are against us.
Regarding the impact on agency security procedures, the publication is clear on the focus of its new framework, stating:
The revised process emphasizes: (i) building information security capabilities into federal information systems through the application of state-of-the-practice management, operational, and technical security controls; (ii) maintaining awareness of the security state of information systems on an ongoing basis through enhanced monitoring processes; and (iii) providing essential information to senior leaders to facilitate decisions regarding the acceptance of risk to organizational operations and assets, individuals, other organizations, and the Nation arising from the operation and use of information systems.
This new Risk Management Framework builds much needed flexibility into the overall federal information security lifecycle to address the increasing nature and scope of threats in real-time, providing a number of key advantages that include:
- Continually evaluating the organization's risk posture and maintaining situational awareness of its cyber security posture
- Understanding the state and maturity of an agency's cyber security program
- Evaluating cyber security programs at key vulnerability points: people, processes, and technology
- Maintaining a focus on the security program lifecycle
- Addressing the key functions (governance, risk, management, compliance, operations) of a security program
Perhaps most importantly, agency security programs will be better positioned to evolve and mature - an absolute necessity for staying ahead of the growing and dynamic threat to our Nation's cyber security.