ISE in the News

“It would be like trying to clap with one hand.” That is how the man tasked with leading the U.S. government’s effort to share and safeguard information describes the prospect of trying to accomplish that goal without collaboration from the geospatial community. Kshemendra Paul, program manager for the government’s Information Sharing Environment, says that while the government’s role in cybersecurity has been all over the news lately, the ISE is in no way new to the information-safeguarding landscape.

From SmartBlog on Leadership, 03/01/2013

The White House will refurbish existing technology for sharing reports of suspected terrorist activity to carry out a new executive order encouraging the disclosure of cyber threats, U.S. intelligence officials told Nextgov.

From NextGov, 03/01/2013

In the days since President Barack Obama released his executive order on cybersecurity, active discussion of the measure's moving parts, implementation and potential impact has been unfolding. One area central to the order -- and to federal cybersecurity in general -- is information sharing among government, industry and other stakeholders.

From Federal Computer Week, 02/22/2013

Sharing information is critical for federal homeland security and counterterrorism programs, and as the program manager of the Information Sharing Environment, Kshemendra Paul is responsible for overseeing efforts to provide integrated information for national security operations.

From FedTech Magazine, 02/15/2013

Federal News Radio: The White House's long-awaited, and much anticipated, Executive Order to improve the cybersecurity of critical infrastructure is far from an answer to the lack of congressional action on the issue, and more about doing something to spur change.

From Federal News Radio, 02/14/2013

Government Executive Magazine: When Hurricane Sandy took aim at the Garden State in October 2012, Gov. Chris Christie crafted what would become a nationally visible leadership response, executed in part from a specially designed information sharing facility in West Trenton, N.J.

From Government Executive Magazine, 02/07/2013

SecurityWeek: Cybercriminals are actually sharing information among each other much more effectively than legitimate businesses and governments. For the most part, the “good guys” are operating in their own silos. Sure they are keeping up on the latest attack methods, but often times the information they are obtaining a) is not actionable b) is not timely enough and c) takes substantial human capital to obtain.

From SecurityWeek, 02/04/2013

IBM Business of Government: To commemorate Data Privacy Day, this blog post addresses the Privacy Controls; the first addressed the Information Sharing Strategy; and a third will discuss the necessary linkages between the two. Data Privacy Day, which as the National Cybersecurity Alliance describes is “an effort to empower people to protect their privacy and control their digital footprint and escalate the protection of privacy and data as everyone’s priority.”

From IBM Business of Government, 02/04/2013

BankInfoSecurity: Sharing information about physical and cyber threats needn't be segregated under the U.S. federal government's National Strategy for Information Sharing and Safeguarding, says Kshemendra Paul, who manages the implementation of the strategy.

From BankInfoSecurity, 01/22/2013

Federal News Radio: Interview with Special Asssistant to the President and Cybersecurity Coordinator Michael Daniel: Last month, the White House released a new national strategy for information sharing and safeguarding. In the preface, President Barack Obama says agencies are sharing and cooperating like never before. But he says, they can do better. And, at the same time, he voices concerns about leaks that can damage national security.

From Federal News Radio, 01/17/2013

Pages