{"445451":{"#nid":"445451","#data":{"type":"external_news","title":"Cybersecurity\u2019s Human Factor: Lessons from the Pentagon","body":[{"value":"\u003Cp\u003EDistinguished Professor \u003Ca href=\u0022http:\/\/www.iac.gatech.edu\/people\/faculty\/winnefeld\u0022\u003EJames A. \u0022Sandy\u0022 Winnefeld \u003C\/a\u003Epublished an article in the\u003Ca href=\u0022https:\/\/hbr.org\/2015\/09\/cybersecuritys-human-factor-lessons-from-the-pentagon\u0022\u003E\u003Cem\u003E Harvard Business Review\u003C\/em\u003E\u003C\/a\u003E with co-authors Christopher Kirchoff and David M. Upton about cybersecurity in the Pentagon.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThey say:\u003C\/p\u003E\u003Cblockquote\u003E\u003Cp\u003EThe vast majority of companies are more exposed to cyberattacks than they have to be. To close the gaps in their security, CEOs can take a cue from the U.S. military. Once a vulnerable IT colossus, it is becoming an adroit operator of well-defended networks. Today the military can detect and remedy intrusions within hours, if not minutes. From September 2014 to June 2015 alone, it repelled more than 30 million known malicious attacks at the boundaries of its networks. Of the small number that did get through, fewer than 0.1% compromised systems in any way. Given the sophistication of the military\u2019s cyberadversaries, that record is a significant feat.\u003C\/p\u003E\u003C\/blockquote\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/hbr.org\/2015\/09\/cybersecuritys-human-factor-lessons-from-the-pentagon\u0022\u003EContinue to full article...\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27498","created_gmt":"2015-09-08 11:39:04","changed_gmt":"2016-10-08 02:27:41","author":"Rachel Miles","boilerplate_text":"","field_publication":"","publication":"campus climate","field_article_url":"","publication_url":"https:\/\/hbr.org\/2015\/09\/cybersecuritys-human-factor-lessons-from-the-pentagon","dateline":{"date":"2015-09-08T00:00:00-04:00","iso_date":"2015-09-08T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"445431":{"id":"445431","type":"image","title":"James A. \u201cSandy\u201d Winnefeld","body":null,"created":"1449256217","gmt_created":"2015-12-04 19:10:17","changed":"1475895184","gmt_changed":"2016-10-08 02:53:04","alt":"James A. \u201cSandy\u201d Winnefeld","file":{"fid":"203180","name":"150702-d-hu462-040.jpg","image_path":"\/sites\/default\/files\/images\/150702-d-hu462-040_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/150702-d-hu462-040_0.jpg","mime":"image\/jpeg","size":439314,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/150702-d-hu462-040_0.jpg?itok=fmYudce6"}}},"media_ids":["445431"],"groups":[{"id":"1281","name":"Ivan Allen College of Liberal Arts"},{"id":"1285","name":"Sam Nunn School of International Affairs"},{"id":"1286","name":"Center for International Strategy, Technology, and Policy (CISTP)"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"1188","name":"International Affairs"},{"id":"140741","name":"pentagon"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}