Despite the difference in their operational goals, security is handled in a surprisingly uniform fashion across both enterprises and federal agencies. To deal with external threats most of these organizations use a traditional security information and event management (SIEM) solution e.g. IBM QRadar or Splunk ES which, at the risk of oversimplification, spits out a relentless stream of real-time alerts to be reviewed by the staff of a security operations center (SOC). Unfortunately, these alerts can quickly become a flood.
For gov’t agencies under increasing attack, threat isolation strategies likely to loom large in battle against bad actors. The internet offers a lot of benefits: You can buy almost anything on Amazon, let ESPN manage your fantasy football league, and reconnect with old friends and family members through social media.
But, as we all know, the web provides significant security challenges. The threat of phishing, ransomware and other malicious attacks from uncategorized URLs, websites and email is ever-present. And, the government is a prime target for attack.
As cloud computing changes the government technology landscape, the conversations around security must change as well.
It is safe to say that cloud computing and cyber security have been the dominant technology topics in the federal government for the past decade and continue to be today. Look no further than the most recently released Cloud Smart Strategy and National Cyber Strategy. It is clear that the administration is focused on continuing to advance these capabilities across the federal government.
Insider threats are nothing new, but advances in technology – such as information storage, data processing, and remote access to assets – have drastically increased the amount of damage a single individual can do. It’s no wonder that both government and industry have shifted their security focus to the insider.
From the Atlanta city government to Alaska’s Matanuska-Susitna Borough, ransomware attacks continue to disrupt government technology systems. These attacks take advantage of gaps in network security, forcing federal, state and local governments to either pay a ransom or see their technology systems – and, in turn – their operations all but shut down.
We’re excited to have the Global Resilience Federation (GRF) involved in this year’s Symposium. Interested in learning more about this organization and the important work they do to support cyber information sharing? Read on for a Q&A with Cindy Donaldson, GRF’s President, and be sure to register for the Symposium to hear Cindy speak about […]
We caught up with Don Maclean, Chief Cybersecurity Technologist, DLT, to get his thoughts on today’s top cyber challenges. You can hear more from Don at the Symantec Government Symposium on Oct. 30, as he shares his perspective on the “Aligning Cyber Priorities and Modernization Policies” panel. 1. Agencies are dealing with so many cyber […]
We sat down with Justin Robinson, Cyber Team Lead, Thundercat, to get his thoughts on today’s risk management challenges. Make sure to visit Thundercat at the Government Symposium on Oct. 30. 1. With today’s complex IT environments, agencies must assess and mitigate risk across several different networks and platforms. How can they best address this […]