Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Uncategorized

Four Strategies for Federal Agencies to Build a Robust and Resilient Cybersecurity Strategy

by Patience Wait
May 14, 2018
in Uncategorized
Reading Time: 3 mins read
A A
Federal Agencies
Share on FacebookShare on Twitter

Federal agencies face a smorgasbord of cybersecurity solutions, all of which promise to solve some, if not all, their problems.

Speaking at the recent Fortinet Federal Partner Forum, Phil Quade, Chief Information Security Officer for Fortinet, said there are numerous criteria agencies employ to make decisions about their cybersecurity purchases.

These include the obvious, such as the degree to which a product meets a specific need, cost – that it’s cheaper to buy and/or to operate – and effectiveness.

It also includes some that are less obvious, or more specific to security, such as the least negative impact on operations, that is, less drag on system speed and agility, and fewer mistakes made when security professionals are using the product, which can be seen as a measure of its relative ease of use.

More broadly, however, Quade suggested there are four overarching strategies that agencies also should consider applying to their purchase decisions.

Future-proof security products

“Agencies need to get out of the cycle of buy, inexorably degrade, replace,” Quade said. Many organizations “have accumulated too many point solutions.”

He suggested thinking of the entire collection of security products as a security fabric, which allows the integration of point solutions, from a range of vendors, without increasing complexity. The goal is to make security akin to a single organism operating in an OODA loop, “from sensing, to sense-making, to decision-making, to relevant action. [In security,] that’s sensors, analytics, automatable courses of action, and mitigation. That future-proofs it.”

Employ modern defense for borderless networks

“As network boundaries disappear, segmentation has become the fundamental strategy,” Quade said. “Yesterday’s strategy was a static, external boundary; now it’s micro- and macro-segmentation of boundaries.”

He suggested that in addition to segmentation, agencies should consider the agility of those boundaries – how quickly they can be rearranged to create new segments.

“With agile segmentation, agencies can decide to collaborate while only sharing the information they want to share, and then tomorrow change the boundaries and share with someone else,” Quade said. “Then security becomes a business enabler.”

Avoid – yet prepare for – the inevitable

“We harden our networks as much as possible, then it’s ‘clean up in aisle 9’ when the boom happens,” Quade said.

Using automated hardening and automated defense addresses avoidance in as agile a way as possible, he suggested.

But applying automation to network regeneration and resiliency is an advanced strategy that agencies can use to look past the “boom.”

“Agencies should create a resiliency analytic,” Quade said. “That allows them to make real-time changes to stay as far left of the boom as possible.”

In transformation, complexity is the foe of security

This is the weakness of security point solutions – as more points are added, it becomes more and more difficult to monitor all of them, to know which alerts are false positives and which are real threats, and whether disparate alerts from different parts of the network are actually related in some way.

“We can’t keep throwing point solutions at people and think they’re going to get more secure,” Quade said. “Use automation to reduce complexity – give the CISO or the network operator visibility into weaknesses.”

Taken together, federal agencies can use these four considerations to shape their evaluation of cybersecurity solutions using the more than just the usual criteria, such as cost and ease of use, Quade said. And, in having a broader perspective on how solutions can be put to work for greatest effect agencies will build a more robust and resilient cyber strategy.

Tags: Building a cybersecurity strategycybersecurityFederal AgenciesFederal CybersecurityFortinetPhil Quade

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5353 shares
    Share 2141 Tweet 1338
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    40 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    11 shares
    Share 4 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us