What exactly does the CSF recommend and how can governments use it to tackle their own unique organizational concerns?
Posts Tagged: DLT
Federal agencies often overlook the recovery step of a cyberattack. Given all the energy that agencies must put into detecting, defending and responding to an attack, this omission is understandable, but today more than ever, recovery is critical.
Agencies can improve their modernization initiatives, and address concerns around security, by consolidating their IT solutions with the help of ITOM tools and the five-step process. Not only can consolidation help with modernization efforts and security, but it can also improve efficiency and cost-savings.
There are five steps that can help agencies better navigate challenges and benefit from IT modernization and consolidation.
Is the federal government taking threat detection seriously?
We’ve previously talked about adopting the CSF and identifying your most valuable assets and data. Now it’s time to discuss the next phase, Protect, which ensures that data at rest and in transit is secure.
Many government organizations are already using the Internet of Things (IoT) to collect data. However, they aren’t reaping the efficiency and cost-saving rewards that they hoped for. Why?
The “Identify” function of the NIST Cybersecurity Framework can be especially helpful in communicating the importance of cybersecurity investments to leaders and ensuring those investments fit into an agency’s security strategy.
For defense agencies to fulfill mission-critical needs, their IT professionals need the right management and monitoring tools and processes. Learn how network connectivity can help.
This blog post is an excerpt from GovLoop’s recent guide, “Government Health IT: The Fight to Keep Public-Sector Data Secure.”