Twitter Feed
NCOIC Discusses e-Discovery and Cloud Computing
Last week during its weekly meeting, the NCOIC Cloud Computing Working Group (CCWG) examined some of the legal aspects surrounding electronically stored information. With government use of cloud computing expected…
Take the survey, get a book!
“Cloud Musings”, in cooperation with Aditya Yadav & Associates, is conducting a new cloud computing survey. This short, eight (8) question poll, is designed to gauge general corporate plans around…
Army Knowledge Leaders Study Cloud Computing
This week it was my pleasure to explore cloud computing with Army Knowledge Leaders (AKL) ! AKL is an intensive 2 year experience of training and work rotations designed to develop leadership,…
Northrop Grumman & Lockheed Martin Selected for CANES
Last week the US Navy awarded initial CANES contracts to Northrop Grumman and Lockheed Martin. Navy officials place the contract values at $775M for Northrop and $937M for Lockheed.…
NCOIC Analyses Cloud Computing With SCOPE
Last week, the Network Centric Operations Consortium (NCOIC) Cloud Computing Working Group (CCWG) started it’s work on cloud interoperability in earnest. The first step in their process is the completion…
TASER Awarded: The NGA ASP/ISP Transition Contract
The National Geospatial-Intelligence Agency (NGA) has awarded the Total Application Services for Enterprise Requirements (TASER) contract to: Accenture National Security Services, LLC BAE Systems Information Technology, Inc. The Boeing Company-Autometric,…
EuroCloud Expands Quickly
Last October I introduced EuroCloud as a pan-European business network with the goal of promoting European use of cloud computing. In the intervening three months, the organization has grown to…
Joining NJVC: A Professional Plateau
This week I begin a new and exciting phase of my professional career by joining the NJVC Enterprise Management Team! For those unfamiliar, NJVC is one of the largest information…
DoD Deputy CIO on Secure Information Sharing
Today on Federal Executive Forum, Dave Wennergren, Deputy CIO, Office of the Secretary of Defense, shared his views on secure information sharing. Mr. David M. Wennergren serves as the Deputy…
Training Conference: Cloud Computing for DoD & Government
Please join me at the Cloud Computing for DoD & Government training conference, February 22-24, 2010 at the Hilton Old Town in Alexandria, VA. This unique conference agenda blends interactive…
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a stepping stone to a more secure government. When I first read this, my immediate reaction was a resounding, “So what!” These results tell me that US Federal Government agencies are using US Government guidance to do their US Government job. Isn’t that what you would expect? Making an impression on me would require a study across multiple industry verticals. If other industries were voluntarily using the NIST Framework, that would be saying something!
Wouldn’t you know it, but such an independent study was actually conducted earlier this year. In March of 2015, the National Cybersecurity Institute did a study of Chief Information Security Officers across multiple industries. This survey not only looked into cybersecurity practices of the US government and military, but it also delved into the security practices of other verticals including Energy/Utilities, Consulting, Information Technology and Banking/Finance. When asked about the specific security standards or frameworks their organization used, 53.1 percent of the respondents cited NIST! This response level was higher than those recorded for Information Technology Infrastructure Library (ITIL), ISO/IEC (International Organization for Standardization/International Electrotechnical Commission) HIPPA (Health Insurance Portability and Accountability Act of 1996), COBIT (Control Objectives for Information and Related Technology) and CMM (Capability Maturity Model). Yes, that impressed me.
When Paul Christman, vice president of federal for Dell Software was interviewed by FedScoop, a leading online publication that covers the US Government market, he said the framework is “just good policy”.
“It applies to schools, universities, hospitals, [the Defense Department], [the Intelligence Community], and civilian agencies. The document doesn’t say ‘This is how the government should protect the government,’ ‘This is how a bank should protect a bank.’ NIST was really trying to say ‘This wasn’t a government program or mandate;’ it’s just good practice.” Kent Landfield, director of standards and technology policy at Intel Security, echoed this sentiment saying that his company was able to fit the NIST recommendations nicely into the information technology security evaluation process as a whole.
And as if NIST had planned to stage an encore performance, two new standards – 800-173, Cloud-Adapted Risk Management Framework: Guide for Applying the Risk Management Framework to Cloud-based Federal Information Systems, and 800-174, Security and Privacy Controls for Cloud-based Federal Information Systems – are currently being drafted for released. According to Dr. Michaela Iorga, senior security technical lead for cloud computing at NIST, these new frameworks are designed to overlay and elaborate upon already-existing standards that lay out the basics for cloud architecture and security. Iorga also suggests that federal organizations should also use FedRAMP, CSA’s Security, Trust and Assurance Registry (STAR), and other certification and authorization programs to make decisions about cloud computing.
With all this new knowledge in my head, I really gained a new appreciation for NIST. The agency seems to be really taking a lead on protecting cyberspace across the board. As the economic value of our collective digital economy gains in importance, this relatively small agency has placed itself at the vanguard of cybersecurity and is truly living up to its mission:
To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
Thank you NIST!
(This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies.)
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2016)
This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes