The Coast Guard might be housed in the Homeland Security Department, but operationally it similar to the armed services. It uses communication infrastructures provided by the Defense Department, notes Capt. Michael Dickey, the commanding officer of the Coast Guard Command, Control, Communications and IT service center.
As National Cybersecurity Assessment and Technology Services lead at the Homeland Security Department’s National Protection and Programs Directorate, Cameron Dixon has been close to the six Binding Operational Directives coming from DHS in recent years.
For Sean Lang, chief information security officer for the Library of Congress, email security is both an internal and external matter.
People may complain about the volume of email they receive, but email remains a massively important medium of communication. Nearly five billion active email accounts exist, generating hundreds of billions of messages every day.
For Bhagwat Swaroop, executive vice president and general manager for email security at Proofpoint, use of the DMARC protocols is a matter of maintaining trust within an organization, among agencies, and between agencies and external constituents.
Ping Look, the executive advisor for security and awareness at Optiv, says assurance in the authenticity of received email is becoming more difficult.
Wally Coggins, the director of the IC Security Coordination Center in the Office of the Director of National Intelligence, has a full plate this year. He says that in the dynamic threat environment, he and his staff are working on three initiatives.
Lawrence Reed, the assistant director for security operations at the Justice Department, says the government needs to up its game when it comes to endpoint security, especially mobile end point.
Jeff Wichman, the practice director for enterprise incident management at Optiv, says the government is doing a “bang up job if effectively responding to cybersecurity incidents.
With the increasingly frequent and diverse nature of cyber attacks, organizations including federal agencies have put a lot of effort into advanced detecting and deeper understanding these threats. “Now,” says Ian Doyle, executive security advisor at IBM Federal, “we’re really seeing the pendulum swing to more response actions.”