Federal Cloud Computing


Book Description

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing. - Provides a common understanding of the federal requirements as they apply to cloud computing - Offers a targeted and cost-effective approach for applying the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) - Features both technical and non-technical perspectives of the Federal Assessment and Authorization (A&A) process that speaks across the organization







DoD Digital Modernization Strategy


Book Description

The global threat landscape is constantly evolving and remaining competitive and modernizing our digital environment for great power competition is imperative for the Department of Defense. We must act now to secure our future.This Digital Modernization Strategy is the cornerstone for advancing our digital environment to afford the Joint Force a competitive advantage in the modern battlespace.Our approach is simple. We will increase technological capabilities across the Department and strengthen overall adoption of enterprise systems to expand the competitive space in the digital arena. We will achieve this through four strategic initiatives: innovation for advantage, optimization, resilient cybersecurity, and cultivation of talent.The Digital Modernization Strategy provides a roadmap to support implementation of the National Defense Strategy lines of effort through the lens of cloud, artificial intelligence, command, control and communications and cybersecurity.This approach will enable increased lethality for the Joint warfighter, empower new partnerships that will drive mission success, and implement new reforms enacted to improve capabilities across the information enterprise.The strategy also highlights two important elements that will create an enduring and outcome driven strategy. First, it articulates an enterprise view of the future where more common foundational technology is delivered across the DoD Components. Secondly, the strategy calls for a Management System that drives outcomes through a metric driven approach, tied to new DoD CIO authorities granted by Congress for both technology budgets and standards.As we modernize our digital environment across the Department, we must recognize now more than ever the importance of collaboration with our industry and academic partners. I expect the senior leaders of our Department, the Services, and the Joint Warfighting community to take the intent and guidance in this strategy and drive implementation to achieve results in support of our mission to Defend the Nation.




Data Centers and the Cloud


Book Description




Government for the Future


Book Description

In recognition of its 20th anniversary, The IBM Center for the Business of Government offers a retrospective of the most significant changes in government management during that period and looks forward over the next 20 years to offer alternative scenarios as to what government management might look like by the year 2040. Part I will discuss significant management improvements in the federal government over the past 20 years, based in part on a crowdsourced survey of knowledgeable government officials and public administration experts in the field. It will draw on themes and topics examined in the 350 IBM Center reports published over the past two decades. Part II will outline alternative scenarios of how government might change over the coming 20 years. The scenarios will be developed based on a series of envisioning sessions which are bringing together practitioners and academics to examine the future. The scenarios will be supplemented with short essays on various topics. Part II will also include essays by winners of the Center’s Challenge Grant competition. Challenge Grant winners will be awarded grants to identify futuristic visions of government in 2040. Contributions by Mark A. Abramson, David A. Bray, Daniel J. Chenok, Lee Feldman, Lora Frecks, Hollie Russon Gilman, Lori Gordon, John M. Kamensky, Michael J. Keegan, W. Henry Lambright, Tad McGalliard, Shelley H. Metzenbaum, Marc Ott, Sukumar Rao, and Darrell M. West.




Enterprise Cloud Strategy


Book Description

How do you start? How should you build a plan for cloud migration for your entire portfolio? How will your organization be affected by these changes? This book, based on real-world cloud experiences by enterprise IT teams, seeks to provide the answers to these questions. Here, you’ll see what makes the cloud so compelling to enterprises; with which applications you should start your cloud journey; how your organization will change, and how skill sets will evolve; how to measure progress; how to think about security, compliance, and business buy-in; and how to exploit the ever-growing feature set that the cloud offers to gain strategic and competitive advantage.




Regulation of Cryptocurrencies and Blockchain Technologies


Book Description

This second edition further explores the regulatory landscape of cryptocurrency, highlighting the rise of Bitcoin, which is based on blockchain technology, and some of the many types of coins and tokens that emerged thereafter. Although Bitcoin and other cryptocurrencies have made national and international news with their dramatic rise and decline in value, nevertheless the underlying technology is being adopted by both industry and governments, which have noted the benefits of speed, cost efficiency, and protection from hacking. Based on numerous downloaded articles, laws, cases, and other materials, the book discusses the digital transformation, the types of cryptocurrencies, key actors, and the benefits and risks. It also addresses legal issues of digital technology and the evolving U.S. federal regulation. The varying treatment by individual U.S. states is reviewed together with attempts by organizations to arrive at a uniform regulatory regime. Both civil and criminal prosecutions are highlighted with an examination of the major cases that have arisen. This second edition specifically explores the creation of stablecoins, governments issuance of their own versions of digital currencies, new regulations that have been enacted and promulgated, and a clearer examination of futuristic evolutions that potentially will have a major impact upon the current cited technologies.




CISO COMPASS


Book Description

#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.




Cloud Computing


Book Description

Latin America and the Caribbean is well positioned to participate in the digital economy and leverage its opportunities. Cloud computing is an enabling technology, forming the foundation of big data analytics, artificial intelligence, and the Internet of Things, and constituting one of the main pillars of the digital economy. Cloud computing allows government customers to access industry-shaping technology at a speed, cost, and scale previously reserved for the largest companies in the private sector. Governments can essentially do more with less and use newly freed resources—in cost and human capital—to address key challenges they face. In addition to maximizing investments and avoiding additional investments in legacy IT infrastructure, cloud computing enables public sector organizations and government agencies to meet mission-critical objectives and to innovate. Cloud computing represents a unique opportunity for governments in the region to improve productivity and facilitate adoption of the latest technologies and those still to come. By eliminating the upfront costs of IT infrastructure, and having thousands of IT tools and almost unlimited computing capacity available with a pay-as-you-go model, cloud computing also represents a unique opportunity to small and medium enterprises and large corporations to adopt and use state-of-the-art IT solutions. To leverage the benefits of cloud services and new technological developments, governments in Latin America and the Caribbean need to undertake public policy initiatives to develop policy frameworks that quell concerns around data protection, cybersecurity, financial market regulation, and data privacy. This publication provides a specific review on key policies and actions to encourage the adoption of digital infrastructures based on cloud that will empower the global competitiveness of Latin America and the Caribbean.