(ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)

Areas of expertise:
Information security in the US public sector and federal government

Biography:
The (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB) is a group of federal IT security experts from government and industry that provides contributed editorial on a variety of information security-related topics.

Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

All Bloggers » (Isc)² U.S. Government Advisory Board Executive Writers Bureau (Ewb)
0
comments
At this year’s Governing Outlook in the States & Localities conference, a panel of chief information security officers (CISOs) from state and local governments addressed the topic: “CYBER SECURITY: One of the Nation’s Most Serious Challenges.” Participants provided insigh ...
0
comments
What would you do if your personal computer were to get infected with the recent Cryptolocker malware – would you pay the ransom to get back your data? What if your company or government agency system got infected and paying the Cryptolocker ransom was the only way to get back critical bu ...
0
comments
Jurassic DDoS?
Like something from the digital ice age, distributed denial-of-service (DDoS) attacks have thawed and are roaming the cyber planet again, according to data from Google in collaboration with Arbor Networks, which provides insight into the scale and geography of recent cyber strikes. Various othe ...
0
comments
Are we as security practitioners willing to 'eat our own cooking'? In other words, are security professionals practicing what they preach with respect to compliance at the organizational security function level? A recently leaked US Office of the Inspector General (OIG) report pertaining to th ...
0
comments
A controversy concerning the information security policies at the US Department of Veterans Affairs was reported by Federal News Radio last week, and while it is dangerous to draw conclusions from leaks that precede scheduled congressional hearings, and doubly dangerous when those leaks are ass ...
0
comments
For several sessions in a row, federal cybersecurity legislation has been stalled while a squadron of lobbyists debate whether mandated compliance with federal standards will help or hinder IT security efforts in the private sector. The Administration is concerned that voluntary compliance will not ...
0
comments
When new technology introduces new legal questions, it can take a long time for courts to sort matters out, and cybersecurity is no exception to the rule. Cyberattacks that yielded major breaches of financial companies in 2008 or 2009 have spawned a series of lawsuits that aim to determine liability ...
0
comments
With sequestration cuts underway across the federal government, and the plight of the federal information security workforce being traditionally viewed as non-mission essential, one can only hope that the historically underfunded budgets of the federal CISO will survive the carving knives of the seq ...
0
comments
Finally, a Step Forward in Cybersecurity
0 0 1 502 2784 Extension Group 48 7 3279 14.0 Normal 0 false false false EN-US JA X-NONE ...
0
comments
  Going back as far as 2007, the (ISC)² Government Advisory Board (GAB) along with the ISSA-Northern Virginia Chapter Board, have been attempting to develop partnerships with veterans’ organizations in an effort to support veterans transitioning to a civilian career in informat ...
5
comments
At the 2012 Colloquium for Information Systems Security Education (CISSE) last month, a speaker from the US Department of Homeland Security (DHS), National Cyber Security Division, provided a glimpse of a study that was being pursued with the National Academy of Science. The ...
0
comments
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)   The title of a recent InformationWeek article, “Skills Shortage? Quit Whining” caught our attention. In the article, the author highlights data from a recent Deloitte Consulting survey, which report ...
0
comments
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB) At a recent GOVERNING Conference in DC, state and local jurisdictions discussed the recent collapse of agency information technology (IT) staffs in an effort to save scarce financial resources. Among the reported casu ...
0
comments
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB) It takes many, many years for a business area of focus to emerge as a recognized profession. Certainly, cybersecurity is moving in that direction. How does one know? When the US government launches an initiative like t ...
0
comments
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)   Cloud computing is becoming ubiquitous throughout the federal government, and while the adoption of this technology may be more widespread in the private sector, the rigor and transparency provided by the FISMA ...
0
comments
So, What Makes You a Cyber ‘Expert’?
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)   How many cybersecurity practitioners have had a colleague either in information technology (IT), or worse yet, from an unrelated field, offer advice on security matters and insist that they are a cybersecur ...
0
comments
  By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)   In a recent article, "Infosec Joblessness Remains Steady, at 0%", Govinfosecurity.com editor, Eric Chabrow, discussed the startling fact that employment in the information security analyst car ...
0
comments
A recent Washington Post article, “The great jobs mismatch”, points out that structural unemployment is caused by a mismatch between types of positions available and those who have the wrong skill sets to meet them. The information technology area, particularly information security, has ...
1
comment
The Human Factor Reigns Supreme!
Do you know who has access to your computer? Many agencies and corporations spend a majority of their budgets on new technological security software gimmicks while forgetting the human factor. Personnel security must be included as an integral part of information security. All of the technological ...
0
comments
While the Federal Government shutdown was averted thanks to some last-minute political gerrymandering and concessions by both sides of the aisle, it’s quite instructive to reflect on the implications of shutdown on the federal cybersecurity workforce, including contracts and contractors. More ...
Showing 1 - 20 of 20 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×