Government CISOs have an added layer of responsibilities in balancing the pros and cons of social media in their organizations.
10 Breakthrough DARPA Technologies
(click image for larger view and for slideshow)
There is no debating the significance of social media to the online world as we know it today. Twitter, Facebook and the numerous other social media platforms have transformed everything from marketing and brand reputation to communicating official government information.
Although it might seem like a "no-brainer" to fully embrace and accept social media within an enterprise, government chief information security officers (CISOs) and other leaders are grappling with an additional layer of pros and cons in allowing social media platforms within their organizations.
Whereas private industry is typically accountable to a specific group of clients or stockholders, government CISOs are public servants responsible for protecting the information of military veterans, taxpayers and every national citizen. If government systems are compromised, the effect is not solely an embarrassment or loss of revenue. Individual lives can be negatively affected by crimes such as identify theft, and citizens and businesses might be unable to obtain critical government services for grants or patents or the acquisition of records.
Thus, government CISOs need to understand the intended business use of social media and evaluate and clearly convey the associated security and privacy risks. But they also must provide leadership and guidance, keeping other decision-makers properly informed to ensure any intended adoption of social media is both controlled and secure.
Similarly to the origins of the Internet, when the Defense Advanced Research Projects Agency (DARPA) first conceived it, the initial concept and platform for social media was never intended to be used to the extent it is today. As noted in an MIT Sloan Management Review interview, "tools for social business were originally created for consumers." Issues surrounding the business needs, administration and security of social media are still being debated by agency leaders.
Lured by cost savings and other benefits, CISOs wanting to implement social media use within their agency or department must first define the intended purpose -- whether it is for individual employee use, official department or agency communications, or both. The actual business must be the driver for the adoption of a social media platform, as this need will drive the baseline policy, the corresponding security controls, and the acceptable level of risk based on the associated value.
One of a CISO's most critical responsibilities is to ensure that other decision-makers are well-informed of various security risks and can weigh those risks against the promise of better productivity. Here are the five key areas you should monitor for social media:
1. FISMA and other regulatory compliance
Social media is subject to the Federal Information Security Management Act (FISMA) when used to process, store or transmit federal government information. In a June 2011 Government Accountability Office (GAO) Report, the GAO identified challenges in agencies' use of social media relating to records management, privacy and security. Many cloud service providers also have social media components that fall within the scope of the Federal Risk and Authorization Management Program (FedRAMP). Access to and use of social media platforms directly affects compliance with these federal regulations and programs.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.