The Cybersecurity Challenge: Risks and Opportunities

Developments in technology have far outstripped our legal and regulatory levers for protecting data.

Developments in technology have far outstripped our legal and regulatory levers for protecting data. Nextgov and Government Executive magazine have for some time been exploring what is one of the most intractable challenges leaders face -- protecting vital data and networks from theft and exploitation. Below, you'll find our most recent coverage and other resources we hope will be useful in understanding this evolving issue.


MAGAZINE FEATURES
Leading the Way
Estonian President Toomas Hendrik
Ilves knows the challenges of
governing in a wired world.




U.S. AND ESTONIA FORGE NEW
CYBER RELATIONSHIP

Dangerous Liaisons
High-profile data breaches are tipping the balance between connecting and protecting people.

The Threat
Political paralysis may pose the biggest hurdle to securing U.S. networks.

The Challenge

Government isn't well-organized to combat
cyber threats.

The Wrong War

The insistence on applying Cold War metaphors to cybersecurity is misplaced and counterproductive.

Building Cyber Warriors

With IT security experts in short supply, agencies are shaping the next generation from the ground up.



EXPERT INSIGHTS
Governing security in a networked world
Key thinkers weigh in.

Expert Dialogue: Mobility v. Security
Tablets and smartphones can improve productivity, but they pose risks.

Commentary: Defense cyber strategy avoids tackling the most critical issues
The omission of cyber weapons from the strategy is the gorilla in the room.

Special Report: Defense funding for cybersecurity is hard to pin down
Confusion over terminology and agency roles suggests serious procurement challenges, observers say.
GRAPHIC: CYBER SPENDING AT DEFENSE
Blog: Cybersecurity Report
Updates on the battle to protect data and systems.

FROM NEXTGOV'S CONTINUING COVERAGE OF CYBERSECURITY

White House sends Congress a long-awaited cybersecurity proposal

Administration unveils cybersecurity foreign policy

RSA security breach compromised federal network ID tool

Experts recommend an international code of conduct for cyberwar

Pentagon to adversaries: An attack on U.S. networks could
unleash military force


Hack of International Monetary Fund data raises global worries

Shortage of skilled cyber specialists fuels debate over pay

Cyberattacks against federal networks were up 40 percent in 2010

FBI teams with 11 countries to unmask scareware ringleaders

Supreme Court to consider government's warrantless GPS tracking

Apparent wave of cyber breaches is an illusion

White House aims to disrupt al Qaeda online

Pentagon goes on the defensive with cyber strategy


Click for more Nextgov coverage