Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Uncategorized

Defense and Civilian Agencies Embrace Cyber Challenges, Forge New Path Forward

by Jenna Sindle
November 17, 2016
in Uncategorized
Reading Time: 3 mins read
A A
Defense and Civilian Agencies Embrace Cyber Challenges, Forge New Path Forward
Share on FacebookShare on Twitter

Last month was National Cyber Security Awareness Month and while federal CIOs and CISOs ensure that agency workers remain vigilant all year round, the additional focus of a month dedicated to cyber security is a great time to “raise awareness about cybersecurity and… increase the resilience of the Nation in the event of a cyber incident,” according to the Department of Homeland Security.  While many of the activities and awareness campaigns are targeted at individuals, federal agencies – both civilian and defense – use the month to review cyber hygiene protocols with agency teams as well as share their commitment to protecting the nation from cyber attack.

What has been most noteworthy over the course of the last year is a shifting mindset among federal cyber security leads.  From the appointment of the first federal Chief Information Security Officer to the Department of Defense’s bug bounty program, to the reorienting of cyber defense philosophy from keeping the bad guys out to building resilient environments that can weather the inevitable attacks.

At the recent FedTalks event held in Washington D.C., several agency CIOs shared how their mindset has shifted over the last few years since the summer of cyber sprints in 2015 following the devastating breach at OPM.  For Ann Dunkin, CIO of the Environmental Protection agency, good defenses are paramount, but she noted that now she operates from the position that “you also have to assume that you’ve been hacked.”

This radical shift from simply trying to “keep the bad guys out” to accepting that at least some part of your agency’s infrastructure has been breached is the beginning of a much wiser and more successful era of cybersecurity according to John Dancy, CIO at CSRA, Inc.  “Savvy cyber leaders start from the position that their organization has been breached because it enables them to build an overall posture that is more robust,” Dancy noted.  “Far too often we’re finding that the ‘bad guys’ have been in agency networks for long periods of time waiting to launch an attack.  Or, as has been seen recently, there’s an assumption that there are no bad guys, per se, but instead there are rogue insiders who are privileged users who don’t need to breach external defenses in order to exfiltrate proprietary data and classified information.”

Another move that Dancy reflected favorably on was the approach to cybersecurity embraced by CIA CIO, John Edwards.  During a panel on cybersecurity Edwards discussed the importance of a DevOps approach to achieving cybersecurity in the cloud. “With the increased need for collaboration, not only between different agencies within the U.S. Intelligence Community, but also between national intelligence communities to fight terrorism and other global threats, we need to be able to house more data in hybrid clouds securely and be able to share it with confidence,” Dancy said.  “”It’s an ambitious goal to break down not only information silos, but a siloed workflow mentality. CSRA has already realized tremendous benefits of pursuing this approach with our own systems.”

Interested in learning more about CSRA’s approach to robust cyber security?  You can find more information here.

Tags: Ann DunkinCIACIO CIAcyber securitycybersecurityDoD Bug BountyEPAFederal CISOFedScoopFedTalksJohn EdwardsNational Cyber Security Awareness MonthNCSAM

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5369 shares
    Share 2148 Tweet 1342
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    41 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us