, ,

Working From Everywhere Without Sharing Agency Secrets

One thing is certain: Government employees are using mobile devices to access agency data, and that reality raises significant risks.

So how do we leverage the flexibility of mobile to achieve optimal productivity while still securing the mission?

The use of mobile devices is a trend that will increase quickly in the coming years and has implications for agency employees and the ways in which government will interact with citizens.

In light of these trends, GovLoop is pleased to produce this most recent guide in its “Agency of the Future” series, this time turning our attention to the important matter of mobile security.

Specifically, this guide includes:

  • Results from a survey of 255 government employees.
  • Expert insights from three of the most respected leaders in mobile security:
    • Rick Holgate, chief information officer at the Bureau of Alcohol, Tobacco, Firearms and Explosives.
    • Bradley Nix, chief information security officer at the Department of Agriculture’s Food and Nutrition Service.
    • Jeff Ait, director, Public Sector – Americas at Good Technology
  • Sample User ‘Rules of Behavior’ from ATF
  • 6 Steps for Securing a Mobile Enterprise from NIST
  • Mobile Security Cheat Sheet, a summary of the guide’s core contents.

This guide should be required reading for CIOs, CISOs and other senior-level stakeholders who wish to understand the current practices and perspectives of frontline employees using mobile devices in government today. Moreover, the guide will be a valuable resource for any government employee hoping to better understand the nuances and critical issues surrounding the secure use of mobile devices to perform their vital, mission-advancing functions.

What’s happening in your agency when it comes to mobile security?

SPECIAL THANKS TO OUR SPONSORS:

We also thank Carahsoft and their partners: Symantec, EMC, Adobe, Ironkey, BoxTone, Good Technology and VMWare, for serving as the exclusive sponsors of this guide, underwriting the research and interviews that led to this report.

RELATED RESOURCES: