Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

CDM Poised to have a Tremendous Effect on Government

by GTI Editors
June 18, 2014
in Cybersecurity
Reading Time: 3 mins read
A A
Share on FacebookShare on Twitter
CDM_Program
Above diagram shows how DHS’ CDM program will work. CLICK TO ENLARGE

Government needs to become more agile and efficient in the way it combats cyberthreats. CDM is a step in the right direction.

Cybersecurity is a preeminent concern for government officials. In today’s world, it’s imperative that government protects our critical infrastructure to preserve our physical and economic security. To do so, cyber professionals must obtain real-time visibility of networks, improve ability to mitigate known flaws and decrease security risks by reducing their vulnerabilities.

That’s why the Continuous Diagnostic and Mitigation (CDM) program, which enables government entities to decrease known cyber risks and flaws by expanding their continuous diagnostic capabilities, is so important. CDM is poised to have a tremendous effect on government by changing the way agencies combat cyberthreats and improve cybersecurity preparedness. The program does this by:

  • Strategically sourcing tools and continuous-monitoring-as-a-service (CMaaS) solutions.
  • Improving visibility of network vulnerabilities, risks and flaws.
  • Mitigating and identifying flaws at near-network speed.
  • Supporting efforts to provide adequate, risk-based and cost-effective security solutions.

CDM will help agencies procure commercial continuous monitoring solutions. First, the Homeland Security Department, which established the program, will help an agency set up the proper sensors to conduct an automated search for cyber flaws. The results will feed into a local dashboard and export customized reports. The reports can then alert network managers to the most critical flaws and risks based on weighted scores. Administrators will receive prioritized alerts to help allocate resources to mitigate flaws. Finally, progress will be tracked through dashboards and can be compared among department and agency networks, which will help improve the shared risk of each department.

Although new technology continues to enter the marketplace to make life easier, it also leads to increased security risks. Technology trends such as the Internet of Things, mobile and cloud computing have helped meet the public sector’s growing and multifaceted needs. At the same time, this dynamic has led to conflicting interests and added complexity. On one hand, agencies must leverage new technology to meet demand. On the other, technology must be deployed safely and securely to protect data and confidential information.

For more information on the CDM process and to view some interesting statistics and content, you can download “The Continuous Diagnostic & Mitigation Program Field Guide” Report for FREE.

Patrick Fiorenza is a Senior Research Analyst at GovLoop which strives to connect government to improve government. He can be reached at pat@govloop.com.

 

Tags: continuous diagnostics and mitigation

RELATED POSTS

IoT Devices
Security

As IoT Devices Put Government Agencies at Risk, Securing Endpoints Has Never Been More Important

March 11, 2021
What Does Your Agency’s Data Security Plan of Action Look Like?
Cybersecurity

What Does Your Agency’s Data Security Plan of Action Look Like?

July 30, 2020
CDM - Continuous Diagnostics and Mitigation Program
Cybersecurity

CDM Designed to Help Federal Agencies Understand Risk Posture and Become Digitally Resilient

October 24, 2018
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5384 shares
    Share 2154 Tweet 1346
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    86 shares
    Share 34 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us