Some readers are concerned that more and more network managers are dealing with cybersecurity threats by simply making it impossible for end users to work online.
No one would argue that agencies need to reduce their exposure to online cyber threats. But is it really in an agency’s best interest to take employees off the grid (or nearly so)?
“We've nearly perfected security,” writes one reader. “Every time a new e-mail comes in, Outlook stops working to scan it. It may take 10 minutes to write three lines, but our security is good.”
The question is whether security experts are settling for draconian network policies in lieu of identifying policies and technology that would enable employees to work online without compromising agency systems.
“One thing every security weenie should understand is that PERFECT security is attainable only by shutting down the operation you support,” writes M. “Your job is to secure the fully functioning operation, and NOT hobble or disable it.”
Those are strong words, but what do you think? Check out the conversation here.
You can also read more about the FCW Challenge here.
Here are the other topics up for debate:
Government social networks are Towers of Babel, doomed to topple.
The Open-Government Plan is Vaporware 2.0.
Acquisition 2.0 will give ethics officers the heebie-jeebies.
A mandate for the cloud is wishing for pie in the sky.
Posted on May 14, 2010 at 12:18 PM
E-Mail this page
Meet 100 women and men who are doing great things in federal IT.
Click here for the full list
Three-time Federal 100 winner is leaving government in July.
Members of Congress heaped hard questions on federal IT leaders at a June 16 hearing and suggested strongly that somebody needs to be fired.
Senate bill carves out exemption for supercomputing and other lab IT; an earlier version of the measure would have exempted the entire Department of Energy.
OPM is partnering with CSID to try to manage the fallout from a massive breach of some 4 million federal personnel records.
Steve Kelman applauds the OMB's move to make career employees "goal leaders" for performance management initiatives -- but wishes it had come far earlier in the administration.
In an exclusive interview, Jimaye Sones, who was Defense Information Systems Agency comptroller from 2005 to 2013, says he was reassigned after revealing questionable accounting practices at the agency.
Through computer forensics training and internships, veterans are helping Immigration and Customs Enforcement tackle a backlog in child exploitation cases.
After two months on the job studying DOD's cybersecurity and IT needs, Secretary Ashton Carter is set to unveil a new Pentagon cyber strategy in Silicon Valley.
The failure of massive federal IT projects can usually be traced to poor management. The solution is as multilayered as the projects themselves.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com