SlideShare a Scribd company logo
1 of 3
WASHINGTON (AP) — Leaders from across the District of Columbia municipal
government gathered last April for a summit on cybersecurity, where they agreed in
writing on the need to improve computer safety training for its workers. Yet nearly a year
later, no organized, across-the-board training is offered for employees even though
electronic data theft from governments is on the rise.
Information technology experts see training as a vital component of cybersecurity and
D.C. officials acknowledge their own employees should be better educated on computer
use, especially as governments face increasingly sophisticated cyber-threats and as
human errors have contributed to widespread data breaches.
But officials say they’ve put plans for such training on the back-burner while they
continue efforts to improve network security, including through new tools and products as
well as additional levels of monitoring and inspection. Those improvements are more
efficient and longer-lasting than educating thousands of workers who may not be in their
jobs permanently, contends Rob Mancini, the District’s chief technology officer.
“You don’t start talking about what people should do unless you know you’ve got
protections in place to help,” Mancini said in an interview. “You don’t go educating users
until you’ve got something behind it.”
The federal government has identified cybersecurity as a critical
priority, unveiling new efforts to fight the theft of trade secrets and discourage
intellectual property theft. In his State of the Union address, President Barack
Obama urged Congress to pass legislation to help protect computer networks from
attack and warned that American enemies are exploring ways to sabotage the
power grid, financial institutions and air traffic control system. Companies including
Facebook, Twitter, Microsoft and Apple have been recently hacked, as have
financial services companies that maintain credit card account information.

          State governments, repositories of personnel information, financial
data, emergency operations plans, health care records and other documents, are
particularly vulnerable targets. A 2012 study by the Deloitte consulting firm and the
National Association of State Chief Information Officers found that less than a
quarter of the state information security chiefs felt confident in their state’s ability to
protect data from an outside threat.
          D.C. officials, recognizing the problem, organized an exercise last April to
gauge the government’s cyber-attack readiness.
          A section of the after-action report, obtained by The Associated Press
through a public records request and marked “exercise sensitive,” identified as a
primary area for improvement “cyber-security training for District employees at the
awareness, performance, and management levels” and said participants had agreed
on the need to raise employee workforce education efforts. But in responding to
follow-up requests for written cybersecurity training materials that are provided to
employees, neither the office of chief technology officer nor the homeland security
agency said they had documents to produce.
D.C. Homeland Security Director Chris Geldart said D.C. was studying
other jurisdictions’ best practices, acknowledging, “We need to improve on this.”
          Paul Quander, the deputy mayor for public safety, said he believes some
employees have received some type of training and that notices and alerts about
cybersecurity are distributed on occasion within the government. But he said he’s
not convinced training is the most efficient safeguard, in part because of employee
turnover, and that he’d prefer a system-wide approach that lessens the chance of
an employee error opening the door to a cyber-attack. He declined to elaborate on
the record.
          Though there’s no guarantee a tech-savvy workforce can thwart an
Internet attack, experts say cybersecurity education is increasingly important as
adept hackers, capable of preying on a computer user’s mistake, judgment lapse
or open social media account, develop more tools to penetrate government
websites.
          When it comes to cybersecurity, “the weakest link can impact an entire
network,” said Eric Chapman, deputy director of the Maryland Cybersecurity
Center at the University of Maryland.
          “If you have one user who’s fundamentally unaware of what a spear-
phishing email looks like, the entire enterprise is vulnerable,” he added, referring to
a ploy in which computer uses receive legitimate-looking emails that offer plausible
explanations for requesting personal data, along with a link. Hackers can gain
access to sensitive data once the recipient clicks on the link.
          Breaches frequently involve a degree of human error.

More Related Content

Viewers also liked

результаты диагностики знаний обучающихся 9 11 классов (октябрь 2012 г.)
результаты диагностики знаний обучающихся 9 11 классов (октябрь 2012 г.)результаты диагностики знаний обучающихся 9 11 классов (октябрь 2012 г.)
результаты диагностики знаний обучающихся 9 11 классов (октябрь 2012 г.)oznob
 
каникулы 10 а класса
каникулы 10 а классаканикулы 10 а класса
каникулы 10 а классаoznob
 
каникулы 10 а класса
каникулы 10 а классаканикулы 10 а класса
каникулы 10 а классаoznob
 
капустник 10а
капустник 10акапустник 10а
капустник 10аoznob
 
презентация 40 летие школы
презентация 40 летие школыпрезентация 40 летие школы
презентация 40 летие школыoznob
 
Flying without wings
Flying without wingsFlying without wings
Flying without wingsokkysetyo
 
1klass instruction
1klass instruction1klass instruction
1klass instructionoznob
 
результаты независимой оценки качества образования (май 2012 г.)
результаты независимой оценки качества образования (май 2012 г.)результаты независимой оценки качества образования (май 2012 г.)
результаты независимой оценки качества образования (май 2012 г.)oznob
 
Simplifying Database Development (OSCON 2009)
Simplifying Database Development (OSCON 2009)Simplifying Database Development (OSCON 2009)
Simplifying Database Development (OSCON 2009)PostgreSQL Experts, Inc.
 
Options for year 10 parents 2013
Options for year 10 parents 2013Options for year 10 parents 2013
Options for year 10 parents 2013Chris Hildrew
 
Портфолио директора ГБОУ СОШ № 781
Портфолио директора ГБОУ СОШ № 781Портфолио директора ГБОУ СОШ № 781
Портфолио директора ГБОУ СОШ № 781oznob
 

Viewers also liked (12)

результаты диагностики знаний обучающихся 9 11 классов (октябрь 2012 г.)
результаты диагностики знаний обучающихся 9 11 классов (октябрь 2012 г.)результаты диагностики знаний обучающихся 9 11 классов (октябрь 2012 г.)
результаты диагностики знаний обучающихся 9 11 классов (октябрь 2012 г.)
 
каникулы 10 а класса
каникулы 10 а классаканикулы 10 а класса
каникулы 10 а класса
 
зорилго
зорилгозорилго
зорилго
 
каникулы 10 а класса
каникулы 10 а классаканикулы 10 а класса
каникулы 10 а класса
 
капустник 10а
капустник 10акапустник 10а
капустник 10а
 
презентация 40 летие школы
презентация 40 летие школыпрезентация 40 летие школы
презентация 40 летие школы
 
Flying without wings
Flying without wingsFlying without wings
Flying without wings
 
1klass instruction
1klass instruction1klass instruction
1klass instruction
 
результаты независимой оценки качества образования (май 2012 г.)
результаты независимой оценки качества образования (май 2012 г.)результаты независимой оценки качества образования (май 2012 г.)
результаты независимой оценки качества образования (май 2012 г.)
 
Simplifying Database Development (OSCON 2009)
Simplifying Database Development (OSCON 2009)Simplifying Database Development (OSCON 2009)
Simplifying Database Development (OSCON 2009)
 
Options for year 10 parents 2013
Options for year 10 parents 2013Options for year 10 parents 2013
Options for year 10 parents 2013
 
Портфолио директора ГБОУ СОШ № 781
Портфолио директора ГБОУ СОШ № 781Портфолио директора ГБОУ СОШ № 781
Портфолио директора ГБОУ СОШ № 781
 

Recently uploaded

Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 

Recently uploaded (20)

No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 

Dc government employees not yet offered cybersecurity

  • 1. WASHINGTON (AP) — Leaders from across the District of Columbia municipal government gathered last April for a summit on cybersecurity, where they agreed in writing on the need to improve computer safety training for its workers. Yet nearly a year later, no organized, across-the-board training is offered for employees even though electronic data theft from governments is on the rise. Information technology experts see training as a vital component of cybersecurity and D.C. officials acknowledge their own employees should be better educated on computer use, especially as governments face increasingly sophisticated cyber-threats and as human errors have contributed to widespread data breaches. But officials say they’ve put plans for such training on the back-burner while they continue efforts to improve network security, including through new tools and products as well as additional levels of monitoring and inspection. Those improvements are more efficient and longer-lasting than educating thousands of workers who may not be in their jobs permanently, contends Rob Mancini, the District’s chief technology officer. “You don’t start talking about what people should do unless you know you’ve got protections in place to help,” Mancini said in an interview. “You don’t go educating users until you’ve got something behind it.”
  • 2. The federal government has identified cybersecurity as a critical priority, unveiling new efforts to fight the theft of trade secrets and discourage intellectual property theft. In his State of the Union address, President Barack Obama urged Congress to pass legislation to help protect computer networks from attack and warned that American enemies are exploring ways to sabotage the power grid, financial institutions and air traffic control system. Companies including Facebook, Twitter, Microsoft and Apple have been recently hacked, as have financial services companies that maintain credit card account information. State governments, repositories of personnel information, financial data, emergency operations plans, health care records and other documents, are particularly vulnerable targets. A 2012 study by the Deloitte consulting firm and the National Association of State Chief Information Officers found that less than a quarter of the state information security chiefs felt confident in their state’s ability to protect data from an outside threat. D.C. officials, recognizing the problem, organized an exercise last April to gauge the government’s cyber-attack readiness. A section of the after-action report, obtained by The Associated Press through a public records request and marked “exercise sensitive,” identified as a primary area for improvement “cyber-security training for District employees at the awareness, performance, and management levels” and said participants had agreed on the need to raise employee workforce education efforts. But in responding to follow-up requests for written cybersecurity training materials that are provided to employees, neither the office of chief technology officer nor the homeland security agency said they had documents to produce.
  • 3. D.C. Homeland Security Director Chris Geldart said D.C. was studying other jurisdictions’ best practices, acknowledging, “We need to improve on this.” Paul Quander, the deputy mayor for public safety, said he believes some employees have received some type of training and that notices and alerts about cybersecurity are distributed on occasion within the government. But he said he’s not convinced training is the most efficient safeguard, in part because of employee turnover, and that he’d prefer a system-wide approach that lessens the chance of an employee error opening the door to a cyber-attack. He declined to elaborate on the record. Though there’s no guarantee a tech-savvy workforce can thwart an Internet attack, experts say cybersecurity education is increasingly important as adept hackers, capable of preying on a computer user’s mistake, judgment lapse or open social media account, develop more tools to penetrate government websites. When it comes to cybersecurity, “the weakest link can impact an entire network,” said Eric Chapman, deputy director of the Maryland Cybersecurity Center at the University of Maryland. “If you have one user who’s fundamentally unaware of what a spear- phishing email looks like, the entire enterprise is vulnerable,” he added, referring to a ploy in which computer uses receive legitimate-looking emails that offer plausible explanations for requesting personal data, along with a link. Hackers can gain access to sensitive data once the recipient clicks on the link. Breaches frequently involve a degree of human error.