Smart Cyber: Complex Challenges, Bold Solutions
How can government find clarity as cybersecurity only grows more complex?
How can government find clarity as cybersecurity only grows more complex?
Three main takeaways from the first-of-its-kind government job fair held in Silver Spring on Nov. 6.
The first-of-its-kind hiring fair brought together more than 1,800 job seekers from 40 states, and hiring managers from 33 federal agencies. The ultimate goal is to fill 500 IT and cybersecurity positions governmentwide.
Automation tools like Red Hat’s Ansible — an open source IT configuration management, deployment and orchestration tool — can help agencies turn their security posture from reactive to proactive.
At GovLoop’s Gov Trends Virtual Summit, we heard from Nadav Benbarak, Director of Industry Solutions at Okta, and John Harrington, CSRA’s Chief Architect supporting the Office of the CIO. They explained how identity and access management (IAM) can play a central role in every technology strategy agencies must embrace to modernize.
Incorporating new technologies, such as software-defined networking (SDN) and network function virtualization (NFV), can provide improved network functions, management and operations. There are a number of challenges to achieving digital transformation, but intelligent automation can better enable agencies to adopt SDN and NFV into their infrastructure.
The “Identify” function of the NIST Cybersecurity Framework can be especially helpful in communicating the importance of cybersecurity investments to leaders and ensuring those investments fit into an agency’s security strategy.
Platforms like Amazon Web Services (AWS) are transforming the way government thinks about storage, integration, cybersecurity and analytics, and are helping agencies overcome common data challenges.
Cybersecurity innovations can be difficult to implement in state government. Rajiv Das, Michigan’s CSO, spoke about what his state has been up do.
While many solutions exist for organizations and companies transitioning to cloud architecture, most aren’t suitable for the more sensitive government work.