CDM Hits Phase Three: Determining What is Happening on the Network

The Continuous Diagnostics and Mitigation (CDM) program, led by the Department of Homeland Security, was designed to fortify the cybersecurity of government networks and systems with capabilities and tools that identify risks on an ongoing basis, prioritize these risks based on potential impacts, and enable personnel to mitigate the most significant problems first. The program was rolled out in phases with phases one and two pretty much complete across government.

Now that agencies know what and who is on their network, they need to move onto phase three - what is happening on the network. This involves installing and managing the network and perimeter security measures. Given that the perimeter now includes mobile devices, securing those devices and the way they access the network is critical to meeting CDM goals. Currently,agencies are mapping out mobile connections at the agency level, and the networks with which agencies are regularly interacting.

Continue reading

FedRAMP’s Ongoing Evolution

The Federal Risk and Automation Management Program, commonly known as FedRAMP, was introduced in 2010 and signed into policy at the end of 2011 as a "standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services." In plain English, it provides a baseline for agencies to determine if a cloud solution is secure enough for them to use. Vendors get FedRAMP certified as a way to prove their solution is ready to plug and play into federal systems.

In recent years, cloud has moved from a curiosity for most agencies to a key part of IT infrastructure. With this change in cloud acceptance and use, FedRAMP has also started to evolve to meet today's needs. Last summer, Rep. Gerry Connolly introduced the FedRAMP Reform Act of 2018 as a more stringent enforcement of the use of FedRAMP guidance. Continue reading

Events On-Demand

We're living in an on-demand world - streaming video, same day delivery, peer-to-peer sharing, and more - and events have also adapted to consumer desire for content where and when they want it.

On-demand events tend to be in a webinar format - an educational, one directional presentation. While these events may lack the networking component of live (and even some live streamed) events, they are a great option for learning and training, providing just-in-time information. Continue reading

Department Spotlight: Department of Homeland Security

The Department of Homeland Security (DHS) may be the newest cabinet-level department, but it is still facing the same modernization challenges felt across government. The agencies pulled under the DHS umbrella in 2002 came with legacy systems. While a good deal of integration and modernization happened while DHS was being formed, systems have to keep evolving to keep up with the ever-changing threat landscape and the technologies used to threaten the homeland.

Cybersecurity, as it relates to the protection of the national infrastructure and government systems, is a huge focus for DHS. In fact, The DHS Secretary recently said that nation-state adversaries "are at the highest levels since the Cold War, largely but not exclusively due to leveraging cyber to conduct espionage and influence operations and disrupt services." As part of their efforts to strengthen their cybersecurity posture, the Department is leading the Continuous Diagnostic Monitoring (CDM) efforts across government to provide capabilities and tools to identify cybersecurity risks on an ongoing basis, prioritize these risks based on potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first.

With a broad mandate to support election security, DHS has been collaborating across the government to ensure the security of machines and records for national elections. New technologies such as Albert sensors, technology designed to detect suspicious IP addresses and malware signatures, will be in place in 90% or more of voting machines used in November. Continue reading

Putting the IT in Your Next Doctor VisIT

National Health IT Week was designed to raise awareness of the role IT plays in healthcare and to move forward the use of IT solutions that make a difference in the quality of patient care. The field of Health IT has evolved greatly from using technology to help with administrative functions and patient records. Today, Health IT is at the bedside with telemedicine consults, IoT medical devices, patient education, and more. Additionally, the health market is looking to emerging technologies like blockchain to help with chain of custody of records and controlled substances. IT is also playing a huge role in public health by using data analytics to spot patterns and trends in everything from flu outbreaks to opioid abuse.

With all of these opportunities for IT to become part of the delivery of healthcare there are of course huge security concerns. Publicity around breeches and ransomware incidents have put the industry on high alert to be proactive in their security and responsive to public concern about the security of private health data. Continue reading