bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
9:44 pm, October 21, 2014

Search Result

Search Tags:  risk management

Newtown Connecticut, risk management and gun lobbying

On this week's Bloomberg Government Capital Impact show, analysts will discuss the mass shooting at an elementary school in Newtown Connecticut. They will also talk about how President Obama plans to respond to the tragedy, and the impact that response will have on the gun lobby.
December 20, 2012

Tags: acquisition , Newtown shootings , gun lobby , NRA , President Obama , Allen Scott , Kiersten Todt Coon , Julianna Goldman , Bloomberg Government , Bloomberg TV , Capital Impact

Thursday - 12/20/2012, 08:58pm EST
Listen

TSA's playbook keeps terrorists guessing

The agency developed a playbook to help officials keep their processes and procedures unpredictable. Deputy Administrator John Halinski said TSA is using a risk-management approach to protecting transportation systems. GAO said DHS as a whole is doing a better job using risk to make decisions.

Tags: management , TSA , GAO , John Halinski , David Maurer , DHS , Jason Miller

Wednesday - 12/12/2012, 05:51am EST
Listen

Sequester stockpiling, resiliency and Thanksgiving lobbying

On this week's Bloomberg Government Capital Impact show, analysts examine the automatic budget cuts known as sequestration, risk-management for companies in the wake of Hurricane Sandy and the economics behind your Thanksgiving dinner.

Tags: BGOV , Capital Impact , Allen Scott , Randy Walerius , Kiersten Todt Coon , Peter Brusoe , sequestration , Sandy , Thanksgiving

Wednesday - 11/21/2012, 02:30pm EST
Listen

The Cybersecurity debate

On this week's Bloomberg Government Capital Impact show, analysts will talk about cybersecurity and risk managment.
October 18, 2012

Tags: acquisition , Bloomberg Government , Capital Impact , cybersecurity , Cybersecurity Act of 2012 , Afzal Bari , Jason Wilson , Kiersten Todt Coon , Liberty Group Ventures LLC , cyber attacks , Allen Scott

Thursday - 10/18/2012, 08:21pm EDT
Listen

How a proper risk management plan could help your agency

A recent paper from Crowe Horwath, LLP, outlines how risk management could help you better manage your projects.

Tags: management , IT , Raj Chaudhary , Bert Nuehring , Crowe Horwath, LLP , Dorothy Ramienski

Friday - 01/15/2010, 04:27pm EST
Listen

NIST, DoD move closer to a set of unified cyber guidelines

IT security also to be worked into federal segment architecture methodology

Tags: technology , Ron Ross , Scott Bernard , Kshemendra Paul , NIST , DoD , Intelligence community , OMB , DoT , cybersecurity ,

Monday - 04/13/2009, 01:04pm EDT
Listen

GAO to tell lawmakers agency cyber measures are lacking

Testimony obtained by FederalNewsRadio says IT security measurements focus too much on compliance and not on risk. GAO surveyed 24 agencies and found few have moved beyond just fulfilling FISMA requirements.

Tags: technology , Greg Wilshusen , Vivek Kundra , John Streufert , GAO , OMB , State Department , Senate Homeland Security and Governmental Affairs , NIST , Tom Davis , Deloitte , cybersecurity , FISMA ,

Thursday - 10/29/2009, 02:24pm EDT

NIST trying to keep cyber framework current

Updated 800-53 publication expected by July 31

Tags: technology , Ron Ross , NIST , cybersecurity ,

Friday - 04/10/2009, 07:50pm EDT
Listen

Federal Information Security - The Shift to a Risk Management Framework

The National Institute of Standards and Technology's (NIST) recent release of Special Publication 800-37, Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach is an important change in the direction of how federal agencies achieve information security and manage information system-related security risks. It shifts the focus away from a point in time Certification and Accreditation (C&A) approach to compliance towards continually assessing risk and security authorization. As a result, the federal information security community is sending a message to the broader federal community and creating an important discussion: the cyber threat is real and must be addressed in the context of its potential impact on an organization. Cyber security is not as simple as a "check the box" requirement. The paradigm shift away from point in time security and towards obtaining situational awareness of the organization's risk posture must be as pervasive in the federal government as the cyber threats are against us.

Regarding the impact on agency security procedures, the publication is clear on the focus of its new framework, stating:

    The revised process emphasizes: (i) building information security capabilities into federal information systems through the application of state-of-the-practice management, operational, and technical security controls; (ii) maintaining awareness of the security state of information systems on an ongoing basis through enhanced monitoring processes; and (iii) providing essential information to senior leaders to facilitate decisions regarding the acceptance of risk to organizational operations and assets, individuals, other organizations, and the Nation arising from the operation and use of information systems.


This new Risk Management Framework builds much needed flexibility into the overall federal information security lifecycle to address the increasing nature and scope of threats in real-time, providing a number of key advantages that include:
  • Continually evaluating the organization's risk posture and maintaining situational awareness of its cyber security posture
  • Understanding the state and maturity of an agency's cyber security program
  • Evaluating cyber security programs at key vulnerability points: people, processes, and technology
  • Maintaining a focus on the security program lifecycle
  • Addressing the key functions (governance, risk, management, compliance, operations) of a security program


Perhaps most importantly, agency security programs will be better positioned to evolve and mature - an absolute necessity for staying ahead of the growing and dynamic threat to our Nation's cyber security.

Tags: technology , Trusted Advisor Blog , Federal Information Security , NIST

Wednesday - 03/03/2010, 07:39pm EST

TSA debating next steps with Registered Traveler program

Lawmakers question TSA, NPPD on 2010 budget proposals. Rep. Jackson-Lee says NPPD may need to be reorganized.

Tags: mngt , technology , Phil Reitinger , Gail Rossides , Rep. Sheila Jackson-Lee , Rep. Dan Lungren , Rand Beers , DHS , TSA , National Protection and Programs Directorate , House Homeland Security Committee , Registered Traveler , Secure Flight , cybersecurity ,

Thursday - 06/11/2009, 07:29am EDT
Listen
  •  
  • 2