Cybersecurity seems simple enough. The old methodology went something along the lines of installing a strong IT network, training employees to identify and avoid risks, and locking down the most sensitive information in-house.
Posts Tagged: symantec
Despite challenges from a cybersecurity workforce shortage, some agencies are making progress to improve hiring and employee training.
Is the federal government taking threat detection seriously?
Agencies are concerned with the security of the data traversing on-premise, hybrid and cloud environments. In this interview, we learned how an end-to-end cloud security environment can be applied.
We’ve previously talked about adopting the CSF and identifying your most valuable assets and data. Now it’s time to discuss the next phase, Protect, which ensures that data at rest and in transit is secure.
One perk of the MGT Act that’s often touted is the $500 million fund it would create, but some IT leaders say the real value will come from newly created working capital funds at each agency.
At Smart Cyber, Symantec’s 14th Government Symposium, we heard from Jeanette Manfra, Assistant Secretary in the Office of Cybersecurity and Communications at the Department of Homeland Security (DHS). She explained how DHS is attempting to achieve that balance between challenge and opportunity.
The “Identify” function of the NIST Cybersecurity Framework can be especially helpful in communicating the importance of cybersecurity investments to leaders and ensuring those investments fit into an agency’s security strategy.
State and local governments are turning their attention toward identity management, to ensure that critical organization data can only be accessed by the right people, at the right time and for the right reasons. But good identity management is easier said than done.
In the cloud generation, state and local agencies need holistic cloud security strategies to protect data and respond quickly to breaches. With the right plan, state and local governments can not only defend themselves against evolving cyberthreats, they can also thrive in the cloud generation.