What exactly does the CSF recommend and how can governments use it to tackle their own unique organizational concerns?
Posts Tagged: symantec
Federal agencies often overlook the recovery step of a cyberattack. Given all the energy that agencies must put into detecting, defending and responding to an attack, this omission is understandable, but today more than ever, recovery is critical.
The rise in sophisticated cyberattacks and the increasingly broad attack landscape means that agencies must adopt integrated cyber defense. This security model combines threat protection, information protection and compliance enforcement with federal standards in one framework.
Cybersecurity seems simple enough. The old methodology went something along the lines of installing a strong IT network, training employees to identify and avoid risks, and locking down the most sensitive information in-house.
Despite challenges from a cybersecurity workforce shortage, some agencies are making progress to improve hiring and employee training.
Is the federal government taking threat detection seriously?
Agencies are concerned with the security of the data traversing on-premise, hybrid and cloud environments. In this interview, we learned how an end-to-end cloud security environment can be applied.
We’ve previously talked about adopting the CSF and identifying your most valuable assets and data. Now it’s time to discuss the next phase, Protect, which ensures that data at rest and in transit is secure.
One perk of the MGT Act that’s often touted is the $500 million fund it would create, but some IT leaders say the real value will come from newly created working capital funds at each agency.
At Smart Cyber, Symantec’s 14th Government Symposium, we heard from Jeanette Manfra, Assistant Secretary in the Office of Cybersecurity and Communications at the Department of Homeland Security (DHS). She explained how DHS is attempting to achieve that balance between challenge and opportunity.