Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Feds Pitch Cyber-Fence

    Written by

    Caron Carlson
    Published September 9, 2002
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      When the White House releases its plan to improve cyber-security later this month, large enterprises can expect to be prodded to implement network authentication procedures using biometrics, smart cards with PKI and/or secure tokens. The suggestion will not come as an official recommendation; instead, it will likely be buried inside the lengthy, often vague strategy.

      Most of the explicit cyber-security recommendations targeted at large enterprises in the forthcoming national strategy to secure cyberspace reflect best practices that are typically already in place wherever feasible and expedient. However, the strategy, scheduled for release Sept. 18, includes detailed discussions of much more substantive changes for securing enterprise networking, lighting the way for future official positions and, possibly, mandates.

      According to a draft obtained by eWeek, the Presidents Critical Infrastructure Protection Board plans to update the strategy regularly, adding recommendations as the nations understanding of cyber-security evolves. The document emphasizes that the version due out this month lays the groundwork for an incrementally expanding blueprint. The most controversial suggestions—such as implementing biometric or smart-card authentication procedures throughout corporate America—are framed not as recommendations but as discussion points or issues for resolution in later iterations of the document.

      “That would go over like a stink bomb,” Jorge Abellas-Martin, CIO at Arnold Worldwide Inc. and an eWeek Corporate Partner, said about the advanced authentication suggestion. “If I had to tell my creatives that they had to carry around little cards that read out a random strings of numbers, theyd laugh at me.”

      The security needs of large enterprises differ widely, and the practices appropriate for vendors to the federal government are necessarily more stringent than those at advertising companies, such as Arnold Worldwide, in Boston. “[The administration] could recommend that everyone have Pentagon-level security, but unless someone deals directly with federal procurement, its not going to have an impact,” said Abellas-Martin. “I dont see how its going to change peoples behavior if its only a recommendation.”

      The strategys chapter devoted to large enterprises focuses on raising the level of responsibility and accountability for security to chief executives and corporate boards. The expectation is that shareholders will eventually hold boards accountable for security breaches, and, in turn, boards will hold security officials responsible.

      While a separate chapter promotes the highly unpopular recommendation that corporations annually disclose the identity of their IT security audit companies and the scope of their activities, the explicit enterprise recommendations are more subdued. They suggest that CEOs should consider forming enterprisewide corporation security councils to integrate cyber-security, privacy, physical security and operations; CEOs should consider regular independent IT security audits and remediation programs; corporate boards should consider forming IT security committees and should ensure that recommendations of the CIO are regularly reviewed by the CEO; and IT continuity plans should be regularly reviewed and should involve alternate sites and alternate staffs when possible.

      “A responsible company would be doing these sorts of things anyway,” said Frank Calabrese, IT manager at Bose Corp., in Framingham, Mass., and an eWeek Corporate Partner. “But it depends on the business climate, and it depends on the type of industry.”

      The document also recommends that corporations get involved in industrywide programs to develop best practices, share information, raise awareness and work with the insurance industry to expand IT security coverage. For enterprises, the suggestion is likely to be received as a good idea in theory but one that would strain resources.

      “Id love to be able to do something like that. Wouldnt it be nice if we all sat in a room and talked about security,” Calabrese said. “But how many companies are going to take someone and dedicate him to sitting in a room and talking about security with his peers?”

      While the language of the recommendations is mild and mostly unsurprising, the discussion of other steps enterprises should take to secure systems is stark in contrast. The document states that to facilitate network integrity, reliability, availability and confidentiality, enterprises should include PKI (public-key infrastructure) using smart cards, secure tokens, biometrics or a combination of these measures in authentication procedures. In addition, it raises questions for resolution in future releases of the strategy, such as how often large enterprises should have cyber-security audits performed by outside auditors.

      When asked about the draft plans for enterprise security, Tiffany Olson, a spokeswoman for the CIPB, in Washington, said the issues raised in the text are “just kind of adding more to the recommendations.”

      “Recommendations will either become programs or will be discussion points that dont take place,” Olson said. “Over time, things will change, needs will change and ideas will change.”

      Caron Carlson
      Caron Carlson

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×