FOR THE CIO, CTO & CISO
SECURITY: The Human Firewall Cannot Be Fixed, says McAfee CTO. A five-question interview on current topics in cybersecurity. One question may even surprise you. Read more
MANAGEMENT: CIOs Who Master Digital Transformations Will Win CEO Jobs. CIOs who work closely with CEOs to direct digital strategies will eventually find themselves in the CEO’s seat themselves, according to Salesforce.com CEO Marc Benioff. Read more
FEDERAL CISO: ‘Must Haves’ & ‘Must Dos’ For The First Federal CISO. Offensive and defensive experience, public/private sector know-how, ‘mini-NSA’ mindset and vision are top traits we need in a chief information security officer. Read more
NETWORKS: New Juniper Security CTO Promises Open Framework for Software Defined Network Security. The new Juniper Networks liaison between the company’s engineering team and its customers says it will take time, but Juniper’s software defined security networking (SDSN) will eventually support third-party devices to help build security into the network fabric itself. Read more
REPORT: Worldwide Cybersecurity Spending Increasing To $170 Billion By 2020. “Interest in security technologies is increasingly driven by elements of digital business, particularly cloud, mobile computing and now also the Internet of Things, as well as by the sophisticated and high-impact nature of advanced targeted attacks,” said Elizabeth Kim, research analyst at Gartner. Read the rest
OPERATIONS: Presidential Candidates Get Graded On Their Cybersecurity Stances. Trump, Clinton, Sanders, Cruz, Rubio, Kasich, are all unified when it comes to blaming China — but no one gets higher than a “C” average grade in any category. Read more
AUTOMOBILES: GM Asks Hackers Help Its Cybersecurity. General Motors Co. is turning to hackers to strengthen car firewalls. The nation’s largest auto maker on Thursday highlighted a “coordinated disclosure” program it launched earlier this year that invites computer researchers to search for cybersecurity gaps in GM vehicles, websites and software. Read more
FEDERAL GOVERNMENT: DOD Issues Cybersecurity Discipline Guidance. The Defense Department recently issued a military-wide cybersecurity discipline implementation plan, a document that aims to hold leaders accountable for cybersecurity up and down the chain of command and report progress and setbacks. Read more
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems February 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-february-2016.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.