In many organizations, cybersecurity is often treated as a compliance to-do. But in order to bring lasting change, agencies need to create a more cyber-literate culture. This short, overview resource highlights takeaways from a recent discussion with government experts about how agencies can help employees work both effectively and securely. You’ll explore insights from: Kirk H.Read… Read more »
As government agencies continue to leverage the benefits of cloud, the task of meeting security, governance and compliance requirements becomes increasingly critical. This new topic snapshot report provides a concise overview of the challenges agencies face as well as solutions to those problems. You’ll also explore five best practices for implementing a code-to-cloud model toRead… Read more »
The stakes just keep getting higher when it comes to cybersecurity. A government agency is hit with a ransomware attack every 14 seconds, according to a recent report from the Cybersecurity and Infrastructure Security Agency. That’s a scary statistic for any organization, and more so in the public sector, where there’s a high bar setRead… Read more »
One of the best defenses against phishing is multifactor authentication (MFA), which requires users to provide something more than a password, such as a biometric scan, a one-time code or an email notification. Sadly, traditional MFA is not as foolproof as people like to think. That conundrum was the focus of a recent GovLoop virtualRead… Read more »
Many agencies are bogged down with budget battles, lengthy procurement cycles and outdated technology. That makes it harder to follow federal cybersecurity mandates and protect sensitive data. Download this topic snapshot to discover how your organization can create a prioritized cybersecurity upgrade plan to help your modernization journey. You’ll learn: Effective ways to secure theRead… Read more »
The term “critical infrastructure” evokes images of power lines and water treatment facilities, but it also applies to the identity management platforms that protect networks from cyber intrusion. At a recent GovLoop virtual event, “Access Denied: How to Improve Your Agency’s Identity Management,” Steve Caimi, Director of US Public Sector Solutions Marketing with Okta —Read… Read more »
Just when you think you understand cybersecurity, everything changes. In the case of cyber solutions, that change is always for the better, but it can still feel overwhelming. One simple piece of advice: “Don’t look at it and let that paralyze you,” said Russell Marsh, Director of Cyber Operations in the Office of the ChiefRead… Read more »
This resource features tips and takeaways about how to combat cyber threats with automation. Download your resource now: Brought to you by:
In an era of remote work and rising cyberattacks on public sector targets, federal, state and local authorities need a new approach to cybersecurity. They’re rethinking their cyber strategies both in order to keep the bad actors at bay, and also to meet the call for zero-trust architectures. In this report, we look at howRead… Read more »
Check out this new report to learn how agencies’ approaches to security inside systems has changed. You’ll explore how micro-segmentation can better protect your agency.
The language of cybersecurity can be complicated and full of terminology that a layperson may struggle to understand. But protecting computer systems from cyberthreats — especially government systems — is increasingly critical. This worksheet offers information on what zero trust entails and practical steps you can take to adopt it in language anyone can understand.Read… Read more »
This resource explores five sections about the executive order’s key components aimed at enhancing you and your coworkers’ cybersecurity agencywide. Download your copy: Brought to you by:
Discover four steps toward a collective defense approach for your agency’s cybersecurity. Download your Playbook, Maximizing Your Human and Capital Resource Investments: A Cybersecurity Playbook, now: Brought to you by:
How can agencies quickly understand the complexities and nuances of zero-trust security and align with the transformative details in Biden’s EO? We created this playbook to help answer that question.
Explore five areas in which the Cyber Executive Order will influence how govies work and how their agencies think about cybersecurity. Download your resource, 5 Ways the Cyber EO Will Change How Govies Work, now: Brought to you by:
This quick-tips resource covers the EO’s most critical details and their impact on agencies.
Learn how your agency can secure and support multiple work styles through these best practices.
Explore a government case study, best practices and resources to help make DevSecOps a reality at your agency.
Bold – not incremental – changes are needed to address the current government cyberattack landscape. Check out our latest e-book to understand how to ready yourself and your agency for its next cyber incident.
Learn how an agile approach to cybersecurity can empower all employees – wherever they might be working.
Preparing for a future that includes more permanent telework means rethinking the way employees connect and collaborate.
Check out this new report to learn the basics for personal cybersecurity.
Explore activities, quizzes and easy tips for vital cybersecurity concepts.
Get your free copy of this spotlight resource to explore what cybersecurity looks like in the age of hybrid, with personal security tips for home, the office and everywhere in between.
This free worksheet will help you assess your agency’s cloud security.
Learn how your agency can protect its data in this age of sophisticated cyber threats.
Learn how state and local governments can create a strong line of cyber defense.
Reimagine your workspace.
Learn how a Zero Trust model can validate connections, track user and device activity and improve your agency’s overall cybersecurity.
In this new e-book, you’ll learn what dynamic cybersecurity is and how agencies can use it to stay one step ahead of today’s risks.
Explore a recap of a GovLoop roundtable discussion featuring TIC 3.0 policy leaders, plus other sources to help you understand the TIC 3.0 policy.
Get your free copy of our new e-book to explore the challenges of ransomware.
Zero Trust: what is it? Should your agency be implementing it? Watch this short explainer to find out.
Download your copy of this free checklist for seven tips that will provide practical guidance and useful hints to jumpstart the transition at your agency.
Cyberattacks are on the rise and protecting against these attacks is a priority of every government agency at all levels. Knowing your threat maturity level can help you understand your organization’s strengths and weaknesses as you work towards fully integrated threat intelligence. This new worksheet will help you discern where your organization lies on theRead… Read more »
GovLoop created this tool to measure your agency’s cloud readiness, using the federal government’s Cloud Smart strategy for inspiration.
GovLoop created this resource to help your agency understand which skills gaps it must address to fill its shortage of cybersecurity professionals.
Share this checklist with employees at your agency. If they cannot mark each of these tactics off their list, give them the appropriate contact information for your IT or cybersecurity help desk so they can be better prepared to tackle cybersecurity in their daily responsibilities.
This template is a modified version of the System Usability Scale. Use it as a quick way to assess the cybersecurity and usability of your technologies and services for non-IT professionals.