"We must take conscious steps to understand and reduce environmental risks, identify predatory behaviors, and mitigate personal vulnerabilities associated with sexual assault and harassment," Lt. Gen. Howard B. Bromberg, G-1, said in the opening letter of the Army's first formal Sexual Harassment/Assault Response and Prevention campaign plan. Show The Army has seen a 50-percent increase in reports on sexual assault in fiscal year 2013 compared to fiscal year 2012, and officials believe it may be an indication of greater confidence in the Army's response systems and chain of command. In order to keep the momentum going by increasing awareness of Sexual Harassment/Assault Response and Prevention, known as SHARP, services and encouraging victims to report, the SHARP campaign plan provides a road map of how the Army intends to synchronize actions across five lines of effort. The SHARP efforts are in alignment with the DOD's Sexual Assault Prevention Strategy to embed and integrate programs across the force. "To change the culture, to create an Army where everyone is treated with dignity and respect, where people understand boundaries -- that takes time," said Lt. Col. Geoff Catlett of Army G-1. "I think what we're doing is setting the conditions to create culture change." The Army is facilitating the culture change by improving and synchronizing its response systems by enhancing prevention, investigation, accountability, advocacy and assessment capabilities. The Army has had a prevention strategy in effect since 2009, when it introduced "I. A.M. Strong" to the Force, where the initials stand for "Intervene, Act and Motivate," which focused on the importance of bystander intervention. Although marketing materials and messaging were created to get the word out, it was the release of the Department of Defense Prevention Strategy that served as the impetus for a standalone SHARP Campaign Plan that operationalizes the lines of effort set forth in the Strategic Direction to the Joint Force on Sexual Assault Prevention and Response, Catlett said. The DOD Prevention Strategy gave Army leaders and the campaign team an opportunity to rethink how the program is discussed and to place greater emphasis on certain areas, Catlett said. The campaign emphasizes prevention as a priority out of the five SHARP objectives. "A lot of our training is geared toward education. We get a lot of young people coming into the military who don't necessarily have a solid foundation on understanding boundaries between people," Catlett said. "We try to educate young men and women of what it means to live in close proximity while treating each other with dignity and respect." As for investigating assaults, the SHARP program assures victims that world-class investigators and prosecutors will take their case seriously in order to hold perpetrators appropriately accountable. However, there's more to accountability than punishing offenders. Leaders are now being held to an even higher standard based on their actions or inactions with regard to SHARP. "We are holding commanders responsible for their command climates and doing it in a way we've never done before," Catlett said. In addition to a more stringent directive on command climate assessments that includes questions on SHARP and which are administered more frequently at the company-level on up, commanders now have a 360-degree assessment tool that is used to evaluate performance. "The Army will use these surveys and metrics to gather data and track progress for the assessment portion of the program," Catlett said. The SHARP program is improving, enhancing advocacy lines of effort through a pilot of 11 new SHARP Resource Centers, a study to determine the feasibility of a separate military occupational specialty code for SHARP as well as a school house dedicated to professionalizing those who serve as sexual assault response coordinators and victim advocates. "It is a constantly evolving landscape." Catlett said about responding to numerous congressional mandates. "I am constantly inspired by how much this means to the secretary of the Army and the chief of staff of the Army. They genuinely want to see an end to this horrible crime in our ranks." Catlett said. "And I think commanders want that too. We just have to continue to educate and be constantly vigilant." For more information about the Army SHARP program, go to www.preventsexualassault.army.mil. Identity and access management, or IAM, is the security discipline that makes it possible for the right entities (people or things) to use the right resources (applications or data) when they need to, without interference, using the devices they want to use. IAM is comprised of the systems and processes that allow IT administrators to assign a single digital identity to each entity, authenticate them when they log in, authorize them to access specified resources, and monitor and manage those identities throughout their lifecycle. IAM is not just for employees anymore. Organizations must be able to provide secure access for contractors and business partners, remote and mobile users, and customers. With digital transformation, identities are also assigned to Internet of Things (IoT) devices, robots and pieces of code such as APIs or microservices. Multicloud hybrid IT environments and software as a service (SaaS) solutions further complicate the IAM landscape. Because it stands between users and critical enterprise assets, identity and access management is a critical component of any enterprise security program. It helps protect against compromised user credentials and easily cracked passwords that are common network entry points for criminal hackers who want to plant ransomware or steal data. Done well, IAM helps ensure business productivity and frictionless functioning of digital systems. Employees can work seamlessly no matter where they are, while centralized management makes sure they only access the specific resources they need for their jobs. And opening systems to customers, contractors and suppliers can increase efficiency and lower costs. More on IAMTypes of User Authentication A key task of IAM systems is to authenticate that an entity is who or what it purports to be. The most basic authentication happens when a person enters a username and password into a login screen. The IAM system checks a database to make sure they match what’s on record. Modern authentication solutions provide more sophisticated approaches to better protect assets. Authentication vs authorization True data security is not possible without a system to govern identity and access. When implemented properly, IAM solutions can increase productivity among workers by allowing access to data across multiple applications, locations and devices. It also allows for greater collaboration with other organizations, vendors and business partners. The best approach to implementing an IAM solution is to do an audit of existing and legacy systems. Identify gaps and opportunities, and collaborate with stakeholders early and often. Map out all user types and access scenarios, and define a core set of objectives the IAM solution must meet. In addition to assigning digital identities and authorization methods, IT administrators need a way to grant access rights and privileges to each entity. The best practice in access management today is “least privilege.” It means assigning each entity or application access rights to only those resources needed to complete a task or do a job, and only for the shortest amount of time necessary.
More on privileged access management
More on Role-based access management The process or framework for collecting and analyzing identity data across an organization is called identity governance; having a robust identity governance program can help you meet regulatory requirements and control risk to your organization. How IAM and other Security facets interact IAM and AI IAM, cloud and IDaaS IAM from the cloud: Identity as a Service (IDaaS) and
managed identity services.
With remote work becoming the norm and mobile device usage at maximum penetration, the domain of identity and access management has greatly expanded. Unsecured networks and combined with unprecedented user expectations introduces an influx of new device connections, a flurry of requests for remote access to sensitive information, and the looming threat of phishing and other web-based attacks as users hit rogue sites. Artificial intelligence (AI) is instrumental in the future of IAM because it has the ability to recognize patterns and to expand knowledge exponentially – at the same rate as risk. With continuous authentication, the context of a user is constantly evaluated at every interaction. AI is able to analyze micro-interactions while considering time, place and even user movement, calculating at every point the level of potential risk. Next-gen AV software, host-based firewall, and/or endpoint detection and response (EDR) will continue to evolve and add even more security within an organization. SolutionsResourcesWhat is the army sharp slogan?Developed under the tagline “This is Our Army”, the materials are based on the Army values and reinforces the importance of fostering healthy command climates.
What does the Army's vision for the sharp program seek to eliminate?The Army's Sexual Harassment/Assault Response and Prevention program, known as SHARP, exists so the Army can prevent sexual harassment and sexual assaults before they occur. Our goal is to eliminate sexual assaults and sexual harassment by creating a climate that respects the dignity of every member of the Army family.
Which action is defined as the willingness to safely take action and help someone in time of need?Bystander intervention is about preventing and de-escalating potentially violent incidents. It is the willingness to take action and help someone in time of need.
|