,

How to Build Connected Security

We used to think of security in terms of fences, barred windows, and barricades to physical locations. Then, with the rise of computers and other technologies, we began to worry about the virtual perimeter of organizations. Government information systems became more complex, and our security concerns shifted inward to the vulnerabilities of our networks.

But the reality is that security concerns haven’t merely shifted; they have expanded. Today, government agencies have to secure physical, network, and cyber systems.

In this course, we’ll examine the components of an effective security strategy that addresses all necessary systems. We’ll also explain how to combine those different considerations to truly secure your agency from a holistic standpoint. To offer further insight, we’ll hear from Mindy Marvel from Alliance Technology Group and Don Turner from Avaya Government Solutions.

Thank you to Avaya and Alliance for this public sector resource.

Guide to Securing the Everywhere Perimeter

Leave Behind and Security Assessment

Vigilant Platforms

SentryWire