FedTech Magazine - Technology Solutions That Drive Government https://fedtechmagazine.com/rss.xml en 3 Ways to Stay Ahead on Supply Chain Security https://fedtechmagazine.com/article/2019/10/3-ways-stay-ahead-supply-chain-security <span>3 Ways to Stay Ahead on Supply Chain Security</span> <span><span lang="" about="/user/62836" typeof="schema:Person" property="schema:name" datatype="">Elizabeth_Neus_pdwC</span></span> <span>Wed, 10/09/2019 - 08:31</span> <div><p>Supply chain risk is on the rise. Security firm Symantec <a href="https://www.symantec.com/blogs/threat-intelligence/istr-24-cyber-security-threat-landscape" target="_blank">reported a 78 percent increase</a> in supply chain attacks in 2018, while <a href="https://cdw-prod.adobecqms.net/content/dam/cdw/on-domain-cdw/tech-solutions-library/security/mkt38127-federal-smi-wp.pdf" target="_blank">62 percent of federal agencies</a> say they’ve experienced a breach or near breach in the past six months.</p> <p>To combat the potential for fallout in the information and communications technology supply chain, the federal government has brought both <strong>industry expertise and executive powers</strong> to bear. </p> <p>The Cybersecurity and Infrastructure Security Agency’s Information and Communications Technology Supply Chain Risk Management Task Force recently released <a href="https://www.cisa.gov/sites/default/files/publications/ICT%20Supply%20Chain%20Risk%20Management%20Task%20Force%20Interim%20Report%20%28FINAL%29_508.pdf" target="_blank">its interim report</a>, and a <a href="https://www.whitehouse.gov/presidential-actions/executive-order-securing-information-communications-technology-services-supply-chain/" target="_blank">May 15 executive order</a> placed restrictions on specific supply chain sourcing.</p> <p>While increasing oversight should help organizations make smart supply chain decisions and limit potential exposure, <strong>many federal agencies are leveraging third-party providers</strong> to assist with management of ICT infrastructure because their ICT supply chains are growing — and increasing in complexity.</p> <p>With National Cybersecurity Awareness Month in full swing, it’s worth taking a step back to focus on <strong>three factors that impact ICT risk</strong> and discover how federal agencies can stay ahead of supply chain security.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/doug-bonderud" hreflang="en"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/Bonderud-Headshot.jpg?itok=DLb_Z2cB" width="58" height="58" alt="Photo of Doug Bonderud" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/doug-bonderud"> <div>Doug Bonderud</div> </a> </div> <div class="author-bio"> <p> <div><p>Doug Bonderud is an award-winning writer capable of bridging the gap between complex and conversational across technology, innovation and the human condition. </p> </div> </p> </div> </div> </div> </div> Wed, 09 Oct 2019 12:31:04 +0000 Elizabeth_Neus_pdwC 43121 at https://fedtechmagazine.com Blockchain's Effectiveness Relies on Breaking Down Tech Barriers https://fedtechmagazine.com/article/2019/10/blockchains-effectiveness-relies-breaking-down-tech-barriers <span>Blockchain&#039;s Effectiveness Relies on Breaking Down Tech Barriers </span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 10/08/2019 - 07:04</span> <div><p>Blockchain, one of the hottest technologies in any sector, could be a valuable tool for government. It could increase transparency in public service operations, increase supply chain visibility to combat counterfeits and automate paper-based processes to improve service delivery to citizens.</p> <p>Interest in the technology is spreading worldwide. Research and Markets, a market research service, <a href="https://www.businesswire.com/news/home/20180108005999/en/Global-Blockchain-Market-2017-2022---Focus-Payments" target="_blank">determined the global blockchain market was valued</a> at <strong>$411.5 million in 2017 and will grow to $7.7 billion by 2022</strong> — an astonishing annual growth rate of nearly 80 percent. In some areas where the Department of Homeland Security is working, <strong>blockchain is rapidly moving from hype to reality.</strong></p> <p>The technology is relatively simple; it’s <strong>a shared database managed by a network of computers around the world</strong>. The technology is highly resistant to data modification; transactions in a blockchain network are recorded as blocks of information in a chronological chain of data.</p> <p>Each chain is copied and kept synchronized across multiple nodes or computers making the system highly resilient to attacks or data loss. Data can be added to a blockchain, but <strong>no information in it can be retroactively modified or deleted without alerting users</strong>.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11801" hreflang="en"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/William-Bryan_undersecretary.jpg?itok=s_NLyFTu" width="58" height="58" alt="William N. Bryan, DHS" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11801"> <div>William N. Bryan</div> </a> </div> <div class="author-bio"> <p> <div><p>William N. Bryan is the Senior Official Performing the Duties of the Under Secretary for Science and Technology at the Department of Homeland Security.</p> </div> </p> </div> </div> </div> </div> Tue, 08 Oct 2019 11:04:25 +0000 phil.goldstein_6191 43116 at https://fedtechmagazine.com Follow the 5 R’s of Rationalization for an Effective Cloud Migration https://fedtechmagazine.com/article/2019/10/follow-5-rs-rationalization-effective-cloud-migration <span>Follow the 5 R’s of Rationalization for an Effective Cloud Migration</span> <span><span lang="" about="/user/62836" typeof="schema:Person" property="schema:name" datatype="">Elizabeth_Neus_pdwC</span></span> <span>Mon, 10/07/2019 - 09:00</span> <div><p>Whether you’re part of the Department of Defense IT team waiting to hear which cloud provider wins the $10 billion JEDI contract, or the solo practitioner at a small agency in charge of your entire IT infrastructure, the beginning of the fiscal year is a good time to think about evaluating your operations.</p> <p>Knowing the exact contents of your software and hardware infrastructure is <strong>valuable information</strong>, critical when your agency is making decisions about what IT project to tackle next. And that holds true whether you’re planning to move to the cloud or just trying to update some on-premises equipment.</p> <p>Once you know what’s on hand, you can start making the determination of what should move to the cloud and what should stay — <strong>not as simple a decision as it may seem</strong>, particularly if your agency is among those relying on legacy infrastructure.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11741" hreflang="en"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/evan%20doty.jpg?itok=fLv2p7qY" width="58" height="58" alt="Evan Doty" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11741"> <div>Evan Doty</div> </a> </div> <div class="author-bio"> <p> <div><p>Evan Doty is a senior field solution architect at CDW focused on hybrid cloud and Microsoft Azure. His areas of expertise include LAN and WAN network design and implementation, Windows system administration, project management, call center management and deployment, and IT vendor management.</p> </div> </p> </div> </div> </div> </div> Mon, 07 Oct 2019 13:00:20 +0000 Elizabeth_Neus_pdwC 43111 at https://fedtechmagazine.com U.S. Census Bureau Fights Misinformation for the 2020 Count https://fedtechmagazine.com/article/2019/10/us-census-bureau-fights-misinformation-2020-count <span>U.S. Census Bureau Fights Misinformation for the 2020 Count</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 10/03/2019 - 13:35</span> <div><p>The <a href="https://www.census.gov/" target="_blank">U.S. Census Bureau</a> is continuing to take steps to secure the 2020 count from disinformation and ensure that the count can withstand potential disasters.</p> <p>The bureau has also created <strong>a “fusion center” to monitor social media for misinformation</strong> during the count, <a href="https://federalnewsnetwork.com/cybersecurity/2019/09/census-bureau-stands-up-fusion-center-to-combat-misinformation-during-2020-count/" target="_blank">according to Federal News Network</a>. </p> <p>Atri Kalluri, senior advocate for decennial census response security and data integrity, recently stood up the fusion center, Enrique Lamas, COO for the bureau, tells the publication. The goal, he says, is to<strong> monitor “things that are being said that need further clarification from the Census Bureau.”</strong></p> <p>The bureau is <a href="https://2020census.gov/en/news-events/rumors.html" target="_blank">working to counter rumors</a> about the census to boost the response rate across the country. In September, the agency began promoting an email address where people can report “confusing” or “false information about the 2020 census.”</p> <p><a href="https://fedtechmagazine.com/article/2019/08/what-zero-trust-model-cybersecurity-and-what-does-it-mean-federal-it-perfcon" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>What is a zero-trust cybersecurity model? </em></a></p> <h2 id="toc_0">Census Works to Keep 2020 Count Secure</h2> <p>The 2020 count will be the nation’s first census where households can respond over the phone or via the internet. Those who do not respond will be contacted via enumerators who will<strong> collect information via mobile devices.</strong></p> <p>The Department of Homeland Security has been <strong>working with the intelligence community and private-sector vendors on cybersecurity</strong> for the count. Earlier this year, the bureau conducted a “red team” test to hunt for vulnerabilities. A red team is an inside group that explicitly challenges an organization’s strategy or ideas and looks at them from the point of view of an adversary to find weaknesses and avoid mistakes.</p> <p>In terms of internal threats, like attacks on the census’s self-response site or the enumerators’ mobile devices, the bureau has said that the <strong>data will be encrypted both in transit and at rest</strong>, <a href="https://www.fedscoop.com/census-cybersecurity-intelligence-agencies/" target="_blank">according to FedScoop</a>. Network activity will be heavily monitored and that the data will be collected and isolated from the internet. Enumerators’ devices will only contain data until it is transmitted to Census systems, and the data will in no way be retained.</p> <p>According to Federal News Network, DHS, at a closed-door briefing earlier this year, “told congressional staff that the 2020 census will <a href="https://federalnewsnetwork.com/cybersecurity/2019/03/census-bureau-confident-2020-website-can-handle-major-web-traffic-next-year/" target="_blank">receive as much support from DHS</a> as the 2020 election.”</p> <p><a href="https://fedtechmagazine.com/article/2019/05/sba-interior-energy-find-different-effective-ways-deploy-cdm" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>Find out how the Small Business Association, the Department of the Interior and the Department of Energy deploy Continuous Diagnostics and Mitigation effectively.</em></a></p> <h2 id="toc_1">Census Bureau Ramps Up Disaster Resilience</h2> <p>The Census Bureau is also taking steps to<strong> enhance resilience for the count in case of disasters</strong>. The agency launched its Decennial Rapid Response Team after Hurricane Dorian hit Florida in September, and shut down two active area census offices, in Florida and Georgia, for several days, according to Federal News Network. </p> <p>Al Fontenot, the associate director for decennial census programs, tells the publication that canvassing staff continued operations in areas that were not evacuated, at the discretion of the “local management on the ground.”</p> <p>“Our first is to ensure the<strong> safety of our staff, our equipment and our facilities</strong>. Our second goal is to <strong>ensure our ability to achieve our mission to complete the count as well as possible</strong>,” Fontenot says. The agency will work with the Federal Emergency Management Agency when working in disaster zones. If a natural disaster should happen during the count, the agency could use administrative records to estimate the household count in an impacted area.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein" hreflang="en"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Thu, 03 Oct 2019 17:35:36 +0000 phil.goldstein_6191 43106 at https://fedtechmagazine.com 5G Promises More Speed, Less Lag for Modernizing Agencies https://fedtechmagazine.com/article/2019/10/5g-promises-more-speed-less-lag-modernizing-agencies <span>5G Promises More Speed, Less Lag for Modernizing Agencies</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 10/03/2019 - 09:10</span> <div><p>As wireless carriers race to roll out the next generation of mobile broadband, federal agencies are in a race of their own. Those who depend on mobile connectivity <strong>need to understand what benefits 5G will offer — and what security concerns may emerge</strong>.</p> <p>On the up side, <a href="https://www.fcc.gov/" target="_blank">the Federal Communications Commission</a> paints a rosy picture of the ways in which 5G’s <strong>low latency, enhanced speed and bigger data capacity </strong>will improve productivity across the government workspace.</p> <p>“5G will enable faster communication services, plus myriad new services and applications, including <strong>expansive IoT, smart transportation networks, telemedicine, smart cities, blockchain and robotics</strong>,” says FCC spokesperson Neil Grace.</p> <p>How much better is it? Tech trade group <a href="https://www.ieee.org/" target="_blank">IEEE</a> estimates the new networks will deliver data with less than a millisecond delay, compared with 4G’s 70-millisecond lag. Peak 5G speeds could reach 20 gigabits per second, versus 1Gbps on 4G.</p> <p><a href="https://fedtechmagazine.com/article/2019/09/despite-delays-gsa-optimistic-about-eis-network-modernization" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>The GSA is still optimistic about network modernization efforts at agencies. </em></a></p> <h2 id="toc_0">More Network Bandwidth Can Deliver Enhanced Productivity for Feds</h2> <p>Big bandwidth and low latency should translate to improved productivity. “Federal agencies’ core missions will be enhanced by the wave of innovation that 5G will bring,” Grace says.</p> <p>Those enhancements could span a broad base of government users. “We can think of all the federal agencies that have folks who carry mobile devices,” says <a href="https://www.idc.com/getdoc.jsp?containerId=PRF005042" target="_blank">Patrick Filkins</a>, senior research analyst with IDC’s Network Infrastructure group, who offers some hypothetical examples:</p> <ul><li>The U.S. Postal Service could leverage high data rates and expanded bandwidth to<strong> more precisely track drivers and packages</strong>.</li> <li>The Defense Department could take advantage of 5G’s low latency to <strong>deliver information to war fighters and commanders in near real time</strong>. (In fact, the DOD this summer <a href="https://fedtechmagazine.com/article/2019/09/dod-ramp-5g-networks-research">made the deployment of 5G a priorit</a>y, hoping to avoid Chinese-based 5G networks.)</li> <li>The Federal Emergency Management Agency and other disaster response entities could use 5G’s small form factor to <strong>create pop-up networks, enabling local connectivity and forging communications links between first-responder teams</strong>.</li> <li>Veterans Affairs could utilize 5G to <strong>send data-rich, high-resolution images wirelessly</strong> from the imaging room to a doctor working on another floor.</li> </ul><p>“You can put more devices on the network than you could before,” Filkins says. “It’s like going from your backyard pool to swimming in the ocean. Now we can start to<strong> connect things, we can automate, we can accrue data" and make better decisions</strong>.</p> <p><a href="https://fedtechmagazine.com/article/2018/09/why-disa-has-embraced-sdn-pentagon-perfcon" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>Find out why DISA has embraced SDN for the Pentagon.</em></a></p> <h2 id="toc_1">5G Security Must Be Addressed with Carriers </h2> <p>Government won’t have direct responsibility for addressing the security of the 5G network. The wireless carriers who roll out 5G will <strong>need to ensure it comes with appropriate safeguards</strong>. Given the higher level of network-oriented threats, there will be a growing need for the government to vet carrier offerings with security top of mind.</p> <p>One place to check for good security practices by the carriers would be the <strong>mobile packet core network</strong>, the place where mobile carriers sometimes piggyback their signal on the public internet. </p> <p>“Carriers plug into that, but they don’t own it,” Filkins says. “We may need to see <strong>more security around that core network, mechanisms that lock down the service provider in relation to the internet</strong>.”</p> <p>All this could happen soon. The FCC has conducted multiple auctions this year for spectra that would enable 5G rollouts, and analysts predict large-scale commercial deployments in the next two to three years.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11361" hreflang="en"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/AdamStone2_0.jpg?itok=cCl1Z1mX" width="58" height="58" alt="Adam Stone" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11361"> <div>Adam Stone</div> </a> </div> <div class="author-bio"> <p> <div><p>Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies.</p> </div> </p> </div> </div> </div> </div> Thu, 03 Oct 2019 13:10:53 +0000 phil.goldstein_6191 43101 at https://fedtechmagazine.com Security Management Infrastructure Is a New Tool for Federal Cybersecurity https://fedtechmagazine.com/resources/white-paper/security-management-infrastructure-new-tool-federal-cybersecurity <span>Security Management Infrastructure Is a New Tool for Federal Cybersecurity</span> <div><p>Federal agencies face a different cybersecurity environment today than they did even a few years ago. Threats are becoming much <strong>more sophisticated in both their targeting and techniques</strong>. State-sponsored adversaries have access to resources that match or exceed the current defensive capabilities of government agencies. At the same time, agencies struggle to protect themselves against some of the most insidious attackers<strong>: agency insiders who misuse their authorized access</strong>. These changes in the threat landscape require that agency cybersecurity teams adapt their thinking and defensive posture to protect government resources.</p> <p>In years past, agencies followed a strategy widely adopted throughout the private sector: Create a strong perimeter defense that keeps malicious actors out of the network. That approach is <strong>woefully ineffective against today’s threats</strong>. The idea of drawing a boundary between networks and labeling them “good” and “bad” simply doesn’t work in an era of cloud computing and a mobile workforce.</p> <p>This requires a different type of response. <strong>Security Management Infrastructure (SMI) </strong>provides this capability by allowing agencies to <strong>detect and respond to attacks that take place within their environment</strong>. This new solution category provides the tools agencies need to deal with sophisticated threats, including malicious insiders.</p> </div> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 10/02/2019 - 11:22</span> <img src="/sites/fedtechmagazine.com/files/document_images/GettyImages-949580946.jpg" width="800" height="533" alt="Security Management Infrastructure" typeof="foaf:Image" /> <div> <div>Document File</div> <div><span class="file file--mime-application-pdf file--application-pdf"><a href="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/document_files/mkt38127-federal-smi-wp.pdf" type="application/pdf; length=1183993">mkt38127-federal-smi-wp.pdf</a></span> </div> </div> Wed, 02 Oct 2019 15:22:29 +0000 phil.goldstein_6191 43096 at https://fedtechmagazine.com Phishing Still Catches Federal Employees Unaware https://fedtechmagazine.com/article/2019/10/phishing-still-catches-federal-employees-unaware <span>Phishing Still Catches Federal Employees Unaware</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 10/02/2019 - 10:52</span> <div><p>Last year, the Defense Information Systems Agency reported that <a href="https://www.nextgov.com/cybersecurity/2018/01/pentagon-thwarts-36-million-email-breach-attempts-daily/145149/" target="_blank">the Defense Department had fended off</a> <strong>36 million malicious emails </strong>containing phishing ploys, malware, viruses or all three. And that’s just one federal agency.</p> <p>The bogus emails that con or coerce users into disclosing key personal data are a major weapon in successful cyberattacks.<strong> Nearly 90 percent </strong>of successful data exfiltrations and breaches in the federal government over the past few years were the result of phishing attacks, <a href="https://fedtechmagazine.com/article/2018/03/phishing-culprit-behind-vast-majority-data-exfiltration-intelligence-official-says">according to William Evanina</a>, director of the National Counterintelligence and Security Center.</p> <p>While education has helped slow the rate of successful phishing attempts, there are still gaps where the misleading messages can get through. One thing to think about during <a href="https://www.dhs.gov/national-cyber-security-awareness-month" target="_blank">National Cybersecurity Awareness Month</a>, which kicked off Oct. 1:<strong> About 18 percent</strong> of those who clicked on test phishing links in 2018 were on mobile devices, according to Verizon’s “<a href="https://enterprise.verizon.com/resources/executivebriefs/2019-dbir-executive-brief-emea.pdf" target="_blank">2019 Data Breach Investigations Report</a>,” which says that mobile users can be more susceptible to phishing.</p> <p>The pace of federal work can also feed the phenomenon. “People are constantly filling out forms, constantly replying to messages. <strong>Everyone is in a hurry to get things done; it’s a constant barrage. That is when people will click automatically</strong>,” says Alex Grohmann, a director on the <a href="https://www.issa.org/" target="_blank">Information Systems Security Association</a>’s international board.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11361" hreflang="en"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/AdamStone2_0.jpg?itok=cCl1Z1mX" width="58" height="58" alt="Adam Stone" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11361"> <div>Adam Stone</div> </a> </div> <div class="author-bio"> <p> <div><p>Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies.</p> </div> </p> </div> </div> </div> </div> Wed, 02 Oct 2019 14:52:01 +0000 phil.goldstein_6191 43091 at https://fedtechmagazine.com DHS to Focus CDM Program on EMM Data, Cyber Risk Scores https://fedtechmagazine.com/article/2019/09/dhs-focus-cdm-program-emm-data-cyber-risk-scores <span>DHS to Focus CDM Program on EMM Data, Cyber Risk Scores</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 09/30/2019 - 13:38</span> <div><p>As fiscal year 2020 rolls into view, the Department of Homeland Security’s Continuous Diagnostics and Mitigation program is not just getting <a href="https://fedtechmagazine.com/article/2019/09/dhs-preps-new-cdm-cybersecurity-dashboard-fall-launch">a new governmentwide cybersecurity dashboard</a>. It will also be <strong>homing in on new areas of cybersecurity data</strong>.</p> <p>Kevin Cox, DHS’ CDM program manager, said earlier this month that the program will look to<strong> integrate federal agency management mobile asset data</strong> into agency CDM dashboards, <a href="https://www.meritalk.com/articles/cox-previews-cdm-program-office-priorities-for-fy2020/" target="_blank">MeriTalk reports</a>.</p> <p>Additionally, starting Oct. 1, agencies will be able to <strong>compare their cybersecurity risk scores to the federal average as part of the dashboards</strong>, <a href="https://fedscoop.com/cdm-scores-relative-kevin-cox-cisa/" target="_blank">according to FedScoop</a>. </p> <p>“We’re going to, out of the gate, have better visualization of the data for agencies, but we’re also looking to bring in better analytics, better business intelligence, as well as, ultimately, machine learning capabilities — being able to apply that to the data so that agencies are getting maximum benefit from their cybersecurity data,” Cox said Sept. 5 while speaking at the Billington CyberSecurity conference in Washington, D.C., <a href="http://fifthdomain.com/civilian/dhs/2019/09/05/here-are-the-2020-priorities-for-dhs-cyber-initiative/" target="_blank">Fifth Domain reports</a>.</p> <p><a href="https://fedtechmagazine.com/article/2019/09/nist-risk-management-framework-how-it-can-help-feds-boost-cybersecurity-perfcon" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>Find out how the NIST Risk Management Framework helps boost agencies’ cybersecurity. </em></a></p> <h2 id="toc_0">DHS Lays Out Technology and Data Priorities for CDM</h2> <p>Automated discovery tools at agencies have discovered <strong>75 percent </strong>more assets on federal networks than agencies found via manual discovery, Cox said, according to Fifth Domain. </p> <p>However, there are <strong>millions of devices</strong> on agencies’ networks. “We want to help the agencies get full understanding of all the privileged users,” Cox said.</p> <p>Over the past year, the CDM program gathered <strong>more data about the cloud service providers agencies are using and their cloud environments</strong>. CDM plans to launch proof-of-concept work on cloud security, Cox said. </p> <p>According to Cox’s presentation slides, the program office plans to “work with the DHS team, agencies, system integrators, and DHS Cybersecurity Division partners to determine the right approach and scope for a cloud security proof of concept,” MeriTalk reports.</p> <p>DHS will also expand pilots with additional agencies to <a href="https://fedtechmagazine.com/article/2019/04/gitec-2019-dhs-partners-agencies-find-and-protect-high-value-assets">protect their high-value assets</a>. The agency expects to “explore the possibility of having at least one pilot per DEFEND group,” according to presentation slides, referring to the Dynamic and Evolving Federal Enterprise Network Defense task order.</p> <p><strong>Machine learning</strong> will also be a factor in agencies’ cybersecurity postures in the future, Cox said. CDM collects network data in a way that’s “aligned” for machine learning analysis, Cox said, according to Fifth Domain. “We’re helping the agencies get those fundamentals in place<strong> so they can benefit from these new technologies</strong>,” he said.</p> <p><a href="https://fedtechmagazine.com/article/2019/07/forensic-it-tools-lead-agencies-better-answers-after-breaches" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>Discover how forensic IT tools lead agencies to better answers after breaches.</em></a></p> <h2 id="toc_1">Agencies Will get to Compare Cyber Risk Scores</h2> <p>Starting Oct. 1, agencies that have access to the new dashboard will be able to compare their cybersecurity risk scores, known as the Agency-Wide Adaptive Risk Enumeration risk-scoring algorithm, or AWARE.</p> <p>As FedScoop notes, AWARE “measures <strong>how agencies are doing on basic security practices like vulnerability, patch and configuration management in near real time</strong>. A smaller cumulative score represents a smaller cyberattack surface.”</p> <p>When it comes to AWARE, 23 Chief Financial Officers Act agencies and 30 other smaller agencies are scheduled to get AWARE scores, with 40 more coming sometime thereafter, Cox said, according to FedScoop.</p> <p>“We want to be careful not to share the scores out publicly because we know adversaries will be looking to see which agencies are having problems so they can go target them,” Cox said. “But there may be ways where, once everybody feels comfortable with their AWARE score — all the data is in good shape — that we share it with the deputy secretaries and everybody sees everybody else’s score.”</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein" hreflang="en"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Mon, 30 Sep 2019 17:38:46 +0000 phil.goldstein_6191 43086 at https://fedtechmagazine.com IRS, Other Agencies See Great Promise in RPA Technology https://fedtechmagazine.com/article/2019/09/irs-other-agencies-see-great-promise-rpa-technology <span>IRS, Other Agencies See Great Promise in RPA Technology</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 09/26/2019 - 09:00</span> <div><p>In April, the General Services Administration <a href="https://fedtechmagazine.com/article/2019/06/feds-ramp-robotic-process-automation-efforts">created a community of practice (CoP)</a> for <strong>robotic process automation technology </strong>(RPA) to help federal IT leaders collaborate and determine how they could best use RPA. </p> <p>Now, it’s starting to gain traction — at least at certain agencies such as the IRS, the Food and Drug Administration, and the Defense Department. </p> <p>Speaking at the CoP’s first industry day earlier this month in Washington, D.C., Federal CIO Suzette Kent said the Trump administration can speed the deployment of RPA and automation technology in government by fostering a “strong working relationship” between the mission and technology leadership at agencies, <a href="https://federalnewsnetwork.com/automation/2019/09/biggest-hurdle-for-rpa-weichert-says-human-technology-divide-proves-challenging/" target="_blank">according to Federal News Network</a>. </p> <p>RPA allows organizations to <strong>automate certain repetitive tasks</strong> — often mundane and tedious work that users do not want to spend much time doing.</p> <p>“Just because automation can minimize repetitive, manual tasks, <strong>that doesn’t mean we should automate an ineffective process </strong>just because it’s easy or you hate doing it. We should continue to aspire to design better processes,” Kent said, according to Federal News Network.</p> <p>True digital transformation via RPA will come when agencies reconsider how they do tasks and coordinate with other agencies. “This not only changes the nature of work. It changes how we work together,” Kent said. </p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/digital-transformation-report.html" tabindex="-1" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Digital%20Transformation_IR_1.jpg" /></a></p> <h2 id="toc_0">The IRS, FDA and DOD Embrace RPA</h2> <p>The IRS is one of the agencies that have been enthusiastic about RPA. The agency expects to<strong> save more than 18,000 work hours</strong> through RPA pilots it rolled out in its procurement office. They help out IRS staff in the last quarter of the fiscal year, when workloads pick up. </p> <p>Harrison Smith, the IRS’s deputy chief procurement officer, said that the amount of work his office has had to complete in the fourth quarter of each fiscal year has increased by 10 percent over the past five years, <a href="https://federalnewsnetwork.com/automation/2019/09/irs-procurement-shop-sees-rpa-as-key-to-handle-growing-year-end-workload-with-shrinking-workforce/" target="_blank">Federal News Network reports</a>. At the same time, funding has decreased. </p> <p>“Continually asking personnel to do more and more with less and less — it’s not something that’s feasible or tenable in the long-run,” Smith said in a call with reporters. </p> <p>IRS Commissioner Chuck Rettig told Congress in April that<strong> roughly 45 percent </strong>of the IRS’ total workforce will be eligible for retirement within the next two years. </p> <p>“With those numbers, <strong>100 people could walk out today</strong>,” Smith said. “And so, helping folks do the work within a reasonable amount of time — helping those folks understand how they can shift out of maybe doing manual paperwork tasks into something that’s more relevant and more pertinent is simply going to enable and empower and make them more enthusiastic.”</p> <p><a href="https://fedtechmagazine.com/article/2019/07/agencies-must-learn-how-unleash-potential-ai" target="_blank"><em><strong>MORE FROM FEDTECH:</strong> Discover how agencies can unleash the potential of AI.</em></a></p> <p>Smith notes that RPA deployments will vary from agency to agency. “They’re not all going to look the same,” he said at the industry event, <a href="https://www.nextgov.com/emerging-tech/2019/09/federal-rpa-solutions-have-one-thing-common-no-two-are-alike/159640/" target="_blank">according to Nextgov</a>. “You have to make sure that if it’s an automation solution for another environment that you have the technology [people] and you have the systems integrators able to talk to the people who are actually performing the work.” </p> <p>Meanwhile, the Food and Drug Administration’s Center for Drug Evaluation and Research has been <strong>developing seven RPA projects as it looks to free up staff to focus on higher-level tasks</strong>, <a href="https://www.fedscoop.com/rpa-drug-cder-pharma/" target="_blank">FedScoop reports</a>. </p> <p>CDER ensures drugs on the market are safe and effective and regulates them throughout their lifecycles, according to FedScoop. Many CDER employees have pharmaceutical science or medical degrees but often spend a lot of time on repetitive, manual tasks. </p> <p>“Some of the activity is done by staff, with very advanced degrees, that would rather not do these kinds of tasks,” Ranjit Thomas, CDER informatics program management lead, told FedScoop. CDER estimates its <strong>RPA projects in development will save 24,000 work hours per yea</strong>r, including those in which bots schedule meetings and assign letters.</p> <p>The Pentagon is also enthusiastic about RPA. At a Sept. 18 Association of Government Accountants event, Erica Thomas, the RPA program manager for the DOD’s Comptroller’s Office, said that RPA has the potential to reshape how federal workers get their jobs done. </p> <p>“When computers were introduced into the workforce, however many years ago, there was a lot of concern that these are going to replace people's jobs,” Thomas said at the event, <a href="https://fcw.com/articles/2019/09/18/rpa-ai-workplace-russell.aspx?m=1" target="_blank">according to <em>FCW</em></a>. “Now when you look around, people have different jobs, they have different things to focus on, they’re more efficient. So, I don't view RPA as a replacement factor at all, it's more of an <strong>upscaling and redirecting resources to appropriate tasks</strong>.”</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein" hreflang="en"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Thu, 26 Sep 2019 13:00:00 +0000 phil.goldstein_6191 43081 at https://fedtechmagazine.com DOD to Lay Foundation for AI-based Cybersecurity https://fedtechmagazine.com/article/2019/09/dod-lay-foundation-ai-based-cybersecurity <span>DOD to Lay Foundation for AI-based Cybersecurity</span> <span><span lang="" about="/dashboard/philgoldstein6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 09/25/2019 - 10:32</span> <div><p>The Defense Department’s <a href="https://media.defense.gov/2019/Feb/12/2002088963/-1/-1/1/SUMMARY-OF-DOD-AI-STRATEGY.PDF" target="_blank">artificial intelligence strategy</a>, released in February, calls for the use of <strong>standardized processes in areas such as data, testing and evaluation, and cybersecurity</strong>. Now, the DOD is starting to make that a reality. </p> <p>The Pentagon’s Joint Artificial Intelligence Center plans to work with the National Security Agency, U.S. Cyber Command and numerous DOD cybersecurity vendors to <strong>standardize data collection across the department</strong>, JAIC chief Lt. Gen. Jack Shanahan said earlier this month, <a href="http://nextgov.com/cybersecurity/2019/09/pentagon-nsa-laying-groundwork-ai-powered-cyber-defenses/159649/" target="_blank">as Nextgov reports</a>. </p> <p>Speaking earlier this month at <a href="https://www.billingtoncybersecurity.com/10th-annual-billington-cybersecurity-summit/" target="_blank">the Billington CyberSecurity Summit </a>in Washington, D.C., Shanahan discussed how the DOD wants to create a consistent way to curate, share and store cybersecurity data from across the Pentagon’s entire IT environment. Doing so will <strong>make it to easier to deploy AI-powered cybersecurity programs</strong>, he said.</p> <p>“Data challenges are a particularly hard one for the cyber piece,” Shanahan said, according to <a href="https://www.defense.gov/explore/story/Article/1953183/cyber-ops-to-gain-speed-accuracy-from-ai/" target="_blank">a news article on DOD’s website</a>.</p> <p><a href="https://fedtechmagazine.com/article/2019/08/what-zero-trust-model-cybersecurity-and-what-does-it-mean-federal-it-perfcon" target="_blank"><em><strong>MORE FROM FEDTECH: </strong>What is a zero-trust model for cybersecurity? </em></a></p> <h2 id="toc_0">DOD Seeks Streamlined Cybersecurity Data for AI</h2> <p>AI tools <a href="https://fedtechmagazine.com/article/2019/07/what-deep-learning-look-machine-learning-federal-it-environments-perfcon">can analyze all manner of data</a>, including video, language, images and more. Generally, it is relatively easy to classify objects. The same thinking applies to predictive maintenance and humanitarian assistance applications, Shanahan said. However, <strong>data in the cybersecurity realm is more ambiguous and thus more difficult to classify</strong>. </p> <p>To do so effectively, the DOD needs to establish a more solid baseline. “What does normal look like so anomalies and variances in the system can be detected in the data?” Shanahan said, according to the DOD. </p> <p>The DOD has about two dozen different cybersecurity vendors, and <strong>each collects data in its own unique way</strong>. Without standardization, the Pentagon will find it more difficult to train AI-based cybersecurity solutions to sift out when there is anomalous behavior. </p> <p>“What does normal look like? If we’re trying to detect anomalous behavior, I have to know what the baseline is,” Shanahan said, according to Nextgov. “[That’s] much more challenging on cyber than it is on full-motion video or predictive maintenance or even in our humanitarian assistance [efforts].</p> <p>Standardized data is also <strong>crucial for creating AI algorithms</strong>. To fully take advantage of AI, “the data problem has to be addressed,” Shanahan said, according to the DOD. </p> <p>To do that, the JAIC is working with the NSA and Cyber Command to <strong>create a starting point for data curation, content, sharing and storage</strong>. </p> <p>“Just on that agreement, I think we'll have much more success down the road as we bring in commercial vendors to do product evaluation,” Shanahan said. “The challenge right now is they didn't know the data they’d be seeing.”</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein" hreflang="en"><img src="/sites/fedtechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>StateTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Wed, 25 Sep 2019 14:32:51 +0000 phil.goldstein_6191 43076 at https://fedtechmagazine.com