Some readers are concerned that more and more network managers are dealing with cybersecurity threats by simply making it impossible for end users to work online.
No one would argue that agencies need to reduce their exposure to online cyber threats. But is it really in an agency’s best interest to take employees off the grid (or nearly so)?
“We've nearly perfected security,” writes one reader. “Every time a new e-mail comes in, Outlook stops working to scan it. It may take 10 minutes to write three lines, but our security is good.”
The question is whether security experts are settling for draconian network policies in lieu of identifying policies and technology that would enable employees to work online without compromising agency systems.
“One thing every security weenie should understand is that PERFECT security is attainable only by shutting down the operation you support,” writes M. “Your job is to secure the fully functioning operation, and NOT hobble or disable it.”
Those are strong words, but what do you think? Check out the conversation here.
You can also read more about the FCW Challenge here.
Here are the other topics up for debate:
Government social networks are Towers of Babel, doomed to topple.
The Open-Government Plan is Vaporware 2.0.
Acquisition 2.0 will give ethics officers the heebie-jeebies.
A mandate for the cloud is wishing for pie in the sky.
Posted on May 14, 2010 at 12:18 PM
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
GSA's administrator talks with FCW about short-term hiring, long-term planning and Robert Frost.
Without a future vision and an appetite for risk, reforms lead down a rabbit hole. There is a better way.
VA's top tech official says he is balancing risks while trying to keep the department's online services open for business.
After five years on the job, the founding director of the Office of Government Information Services believes that a deeper understanding and acceptance of FOIA is seeping into the federal government.
The September attack, made public Nov. 10, potentially puts customer and employee personal information at risk, including addresses, Social Security numbers and emails.
The General Services Administration's Matthew Goodrich predicts more agency-driven authorizations and previews a new two-year road map.
Archie Mackie became product director of enterprise computing at the Army PEO EIS in June. In a Nov. 7 interview with FCW, he explained why the Army is cautious but hopeful in its adoption of the cloud.
While IT procurement and design are already quite centralized under the Office of Information and Technology, sources tell FCW that telemedicine IT and app development at the Veterans Health Administration will be rolled up under the OI&T as well.
Steve Kelman argues that the best place to improve federal procurements is at the beginning.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com