<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; Government Fraud</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/category/government/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>Presidential Memo on Insider Threat: Big Brother or Sound Policy?</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/presidential-memo-on-insider-threat-big-brother-or-sound-policy/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/presidential-memo-on-insider-threat-big-brother-or-sound-policy/#comments</comments>
		<pubDate>Wed, 05 Dec 2012 04:00:07 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=215</guid>
		<description><![CDATA[Recently, an Executive Memo was released addressing the vexing issue of insider threat within departments and agencies of the federal government. This presidential memorandum,“National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs,&#8221; was issued on Nov. 21, 2012. The text of the memo is captured below: This Presidential Memorandum transmits the [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Recently, an Executive Memo was released addressing the vexing issue of insider threat within departments and agencies of the federal government. This presidential memorandum,“National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs,&#8221;  was issued on Nov. 21, 2012. The text of the memo is captured below:</p>
<p>This Presidential Memorandum transmits the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs (Minimum Standards) to provide direction and guidance to promote the development of effective insider threat programs within departments and agencies to deter, detect, and mitigate actions by employees who may represent a threat to national security. These threats encompass potential espionage, violent acts against the Government or the Nation, and unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems.</p>
<p>The Minimum Standards provide departments and agencies with the minimum elements necessary to establish effective insider threat programs. These elements include the capability to gather, integrate, and centrally analyze and respond to key threat-related information; monitor employee use of classified networks; provide the workforce with insider threat awareness training; and protect the civil liberties and privacy of all personnel.</p>
<p>The resulting insider threat capabilities will strengthen the protection of classified information across the executive branch and reinforce our defenses against both adversaries and insiders who misuse their access and endanger our national security.</p>
<p>SIGNED: BARACK OBAMA<br />
<a href="http://www.whitehouse.gov/the-press-office/2012/11/21/presidential-memorandum-national-insider-threat-policy-and-minimum-stand" title="Read the official memo here."></a></p>
<p>For such a brief memo, it has not been without controversy. Some pundits have stated that it will put a chill on whistleblowers while others have argued that such a statement indicates that &#8220;Big Brother&#8221; has landed. I just don&#8217;t see it that way. </p>
<p>The ability to monitor employee interactions with company data has long been available in the private sector. Organizations regularly monitor access to critical or protected information&#8211;and if they aren&#8217;t, they should be. Insider threats, abuse and misuse of data, and malfeasance are common in companies all around the globe. Why should we expect the same is not true in our federal, state, and local governments.  I, for one, feel safer with a &#8220;trust but verify&#8221; approach for the data we all share with federal agencies.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/presidential-memo-on-insider-threat-big-brother-or-sound-policy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fraud in Government: New PWC Study Says its Getting Worse</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/#comments</comments>
		<pubDate>Thu, 17 May 2012 16:24:14 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[US Government]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=155</guid>
		<description><![CDATA[Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else. A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else.  A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime Survey, nearly half of organizations in the public sector have been hit by economic crime in the past 12 months. Cyber crime, employee and supplier fraud in particular are on the rise. The survey also found 46 per cent of respondents had experienced one or more incidents of such crime in the past year.  That’s quite a jump from 37 percent in 2009 and considerably higher than the average of 34 per cent across all sectors.<br />
Some of the other key findings from the survey are equally alarming:<br />
•	More than two-thirds of the crimes experienced in the past 12 months were committed by public sector employees, compared with just over half in 2009.<br />
•	Supplier fraud jumped from 13 per cent to 32 per cent over the same period.<br />
•	Over 50% of those surveyed said they had the resources to detect cyber crime, but most lack the forensic capabilities needed to investigate such incidents.<br />
Source: 2011 Global Economic Crime Survey, PWC: http://www.pwc.com/en_GX/gx/economic-crime-survey/assets/GECS_GLOBAL_REPORT.pdf<br />
Further, the study links this rise in activity to the cuts in public sector spending—a trend that is likely to continue and deepen if the current economic reality remains unchanged.<br />
Government agencies are clearly struggling to address internal fraud. Their efforts are complicated by shifting compliance requirements, impaired visibility into user activity, legacy systems that house mission-critical processes, and the limited effectiveness of existing controls and traditional logging capabilities. </p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber attacks hit gas pipelines</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/cyber-attacks-hit-gas-pipelines/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/cyber-attacks-hit-gas-pipelines/#comments</comments>
		<pubDate>Wed, 09 May 2012 00:01:35 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=151</guid>
		<description><![CDATA[Technorarti Verification code: 4T9PS7PC3FNV Recent reports of sophisticated phishing attacks against natural gas pipeline operators in the United States are highly disturbing. There are approximately 200,000 miles of interstate natural gas pipelines, which supply 25% of the nation’s energy and all of these are potentially at risk. The US Department of Homeland Security has recently [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Technorarti Verification code: 4T9PS7PC3FNV<br />
Recent reports of sophisticated phishing attacks against natural gas pipeline operators in the United States are highly disturbing. There are approximately 200,000 miles of interstate natural gas pipelines, which supply 25% of the nation’s energy and all of these are potentially at risk. The US Department of Homeland Security has recently disclosed that they have been helping US firms with incidents since March 2012. Commenting on the incidents DHS spokesman Peter Boogaard told CNET on Tuesday, “DHS’s Industrial Control Systems Cyber Emergency Response Team has been working since March 2012 with critical infrastructure owners and operators in the oil and natural gas sector to address a series of cyber intrusions targeting natural gas pipeline companies.” </p>
<p>Boogaard continued to share high-level details regarding the events stating, “The cyber intrusion involves sophisticated spear-phishing activities targeting personnel within the private companies. DHS is coordinating with the FBI and appropriate federal agencies, and ICS-CERT is working with affected organizations to prepare mitigation plans customized to their current network and security configurations to detect, mitigate and prevent such threats.” This active series of cyber intrusions targeting natural gas pipeline sector companies appears to have started in late December 2011 and remains active today. </p>
<p>While the origins of these attacks remain unknown and no negative consequences of the breaches have been disclosed to date, this alarming result raises the importance of continuous monitoring and alerting on changes within the enterprise environment. The specter of malicious activity is real, the potential for damage is high and the ability for an attacker or motivated insider to do damage to critical infrastructure is a risk that should be actively guarded against.</p>
<p>Organizations, governments, utilities and critical business sectors alike should seek out ways to monitor their vital systems from within, alert on change and move immediately to put continuous monitoring systems in place. By following strong security practices, base lining the current environment, and using predictive analytics to identify areas of vulnerability and change, we can all reduce risk across the organization. </p>
<p>These tools exist today. The time to deploy them is now.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/cyber-attacks-hit-gas-pipelines/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>NIST SP 800-53 Update: Privacy and Information Security Go Hand-in-Hand</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/nist-sp-800-53-update-privacy-and-information-security-go-hand-in-hand/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/nist-sp-800-53-update-privacy-and-information-security-go-hand-in-hand/#comments</comments>
		<pubDate>Tue, 28 Feb 2012 23:53:34 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=134</guid>
		<description><![CDATA[The National Institute of Standards and Technology (NIST) released its update to Special Publication 800-53 Revision 4 earlier today at the 2012 RSA Conference. The update included two new sections pertaining to insider threat and privacy. As NIST cited, it is a fundamental responsibility of federal agencies to secure information systems and safeguard against unauthorized [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The National Institute of Standards and Technology (NIST) released its update to Special Publication 800-53 Revision 4 earlier today at the 2012 RSA Conference.  The update included two new sections pertaining to insider threat and privacy.</p>
<p>As NIST cited, it is a fundamental responsibility of federal agencies to secure information systems and safeguard against unauthorized access and use of private information. Without a solid foundation of information security, it is impossible to protect the privacy of personally identifiable information (PII). </p>
<p>This revision includes a number of privacy controls to provide transparency, accountability and risk management to mitigate the unauthorized access to PII by those inside and outside the organization. </p>
<p>There often is no way to enforce policies. However, with this update, NIST has demonstrated a maturity in thinking about the issues and provided guidance to make the protection of privacy actionable for government. The new guidance requires federal agencies to evaluate and report on the effectiveness of their information system privacy practices, and should enhance public confidence in the government’s ability to protect and ensure the integrity of PII.</p>
<p>To mitigate the risk of insider threat and potential privacy breaches, agencies should conduct a gap analysis to identify areas for improvement. Then, using technology – such as Attachmate Luminet – agencies should address weaknesses to ensure compliance.</p>
<p>Earlier this month, we noted three actions organizations can take to start securing their information systems. Attachmate makes it easy to mitigate insider threat and privacy issues while becoming compliant with information security policies. Learn more about our enterprise fraud management solution.</p>
<p>-Christine Meyers, senior product marketing manager, Attachmate Luminet</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/nist-sp-800-53-update-privacy-and-information-security-go-hand-in-hand/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>