Submitted by cmasingo on Wed, 12/20/2017 - 15:20
The first blog in this series presented information about Insider Threat policies and key organizations working to prevent Insider Threats. This blog will focus on current, IT-based, and recommended, whole-person risk-rating, efforts to detect and prevent Insider Threats. The next blog post w
Submitted by cmasingo on Wed, 12/20/2017 - 15:04
Submitted by cmasingo on Wed, 12/20/2017 - 14:57
Submitted by cmasingo on Wed, 12/20/2017 - 14:41
Submitted by cmasingo on Wed, 12/20/2017 - 14:41
Submitted by rgordon on Wed, 03/01/2017 - 13:13
Leaders who understand and can leverage effective management tools and practices are better prepared to execute on their priorities and see measurable, positive program results. The IBM Center for The Business of Government is committed to helping identify and distill the lessons learned from the past, identify current and new management initiatives and capacities that will be needed to address key challenges facing the country in this administration, and offer ideas on implementation.
Submitted by rgordon on Wed, 06/29/2016 - 13:14
These attacks are relentless, aggressive and constantly evolving, and have clearly shown that federal agencies and organizations are struggling in managing security threats, despite the stricter security protocols that are often in place at government agencies. Cyber threats are “among the most urgent dangers to America’s economic and national security,” President Obama was quoted as saying in a Wall Street Journal article in 2015.
Submitted by rgordon on Wed, 02/04/2015 - 10:33
This report is the product of a group of experts, which was convened by the Department of Computer Science at the Indiana University of Pennsylvania (IUP). IUP brought together an interdisciplinary panel of experts in national security, international relations, foreign policy, information system network and security, public policy, and computer science. These experts participated in two collaborative roundtable meetings during the first six months of 2014.
Submitted by rgordon on Mon, 03/28/2011 - 13:52
Organizations take great pains to use technology to defend against outside attacks; they work hard to spot and stop the malicious insider who is willfully trying to do ill to systems. However, most organizations fall short in equipping their workers with best practices to make them part of the solution to information security.
Pages