Information Security

Defending the digital infrastructure

iSTOCK/GETTY IMAGES

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Ping: Robby Ann Hamlin

Robby Ann Hamlin

There is always a storm on the wireless security front. Robby Ann Hamlin's job, as unit chief in the FBI's department of IT security, is keeping those thunderheads at bay. The former federal police officer and security professional is responsible for securing the FBI's field offices and mobile agents against digital threats. She took some time to answer our questions about wireless security.

How do you secure the FBI's mobile users and field agents? Education is our first line of defense. We have to ensure our agents and employees are aware of vulnerabilities inherent within the devices they use. The challenge for all is awaiting U.S. government-approved standards and security technologies that can keep up with emerging threats--which is virtually impossible.

Do enterprises underestimate the security risks associated with wireless? Absolutely. The problem arises from not having standard, government-approved wireless projects that include security. This results in well-intended ad hoc solutions by engineers who have not included an adequate security solution in the initial design.

What security improvements have you seen through the changing encryption standards? The rapid changes in the standards make it very difficult for organizations to adopt wireless networking. Some stability would increase the chance for successful integration with existing networks. However, there are certainly existing solutions that can be engineered into systems and provide high security for the protection of our unclassified, sensitive and classified information. But, because of the physical nature of the wireless media (unlicensed RF spectrum), there will always be availability issues.

How does the increasing number of remote employees change the wireless security forecast? Insecure wireless connections will only increase as more organizations support and encourage telecommuting. Our challenge is to provide secure solutions for those who will engage in remote connectivity. History has shown us that if we don't provide users with a secure (or any) solution, they will develop one for themselves, which will technically function for connectivity but will almost certainly not be secure.

For the full text of this interview, visit www.searchsecurity.com/ismag.

Article 11 of 13

Dig Deeper on Security industry market trends, predictions and forecasts

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

Get More Information Security

Access to all of our back issues View All

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close