Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Protecting Endpoints in an Era of Technological Innovation and Agile Development

by Chris Hallenback
July 29, 2016
in Cybersecurity
Reading Time: 4 mins read
A A
Protecting Endpoints in an Era of Technological Innovation and Agile Development
Share on FacebookShare on Twitter

A couple of weeks ago, I had the opportunity to participate in a webinar with Rod Turk, the Chief Information Officer at the Department of Commerce, and Ross Dakin, a Presidential Innovation Fellow at the newly formed Technology Transformation Service.  Along with our host, Sean Waterman, from FedScoop, we had the opportunity to really dive into one of the biggest headaches faced by all government agencies – how to secure endpoints from cyberattack.

Bringing together cybersecurity professionals from different backgrounds always ensures a lively conversation and, in the case, our group was well balanced with each of us bringing experience from the public sector as well as the private sector to the conversation.  In an era of technological innovation and agile development, which government agencies are embracing wholeheartedly, being able to marry perspectives is particularly important since it eases the path to success.  So, for our group – Commerce’s Rod Turk has more than 10 years of executive experience across several agencies including the U.S. Patent and Trademark Office and the Department of Energy, while Presidential Innovation Fellow, Ross Dakin, is brand new to public service and brings with him the verve of startup life and I’m in the middle with part of my career spent as part of the US-CERT team and part in the private sector, with innovators like Tanium.

At the beginning of our conversation we all agreed that data is what drives the attacker. Every endpoint becomes a potential attack vector since it is perceived by the attackers as the gateway to the data.   For each agency there are hundreds of thousands of endpoints to track and defend, which is why cybersecurity becomes such an overwhelming and complex task.  This is particularly true during a period of rapid modernization like many government agencies are currently in as they meet mandates and move more mission critical activities accessible via the Internet and through apps. Two key vulnerabilities introduced by modernization are that for a period of time data often resides in two places – doubling the number of potential attack surfaces – and as a new platform is rolled out data security policies might not be as robust as required out of the gate.

Rod Turk offered his strategies for mitigating security vulnerabilities during periods of transition.  His first tip is to know where data is and, in turn, to have an accurate map of your architecture.  For Turk, architecture refers not only to what physical systems and endpoints you have, how they connect to each other and the data, but also who has access to those endpoints.  He said the Department of Commerce has an important advantage in the fight against cyber attackers, including their partnership with the Department of Homeland Security to leverage the CDM.  The CDM program enables Turk’s team to continuously monitor endpoints and integrate information from tools to provide a more complete and accurate picture of the security of the department’s entire infrastructure.

At the mention of agile development Ross Dakin shared that the Technology Transformation Service, part of the U.S. Digital Service, is encouraging agencies to explore cyber security strategies such as Bug Bounties and Open Source code, which effectively makes ‘everyone’ part of the agency’s cybersecurity team. The Defense Digital Services is running a pilot program this month with their Hack the Pentagon initiative which offers up to $150,000 in bounties for verified identification of security vulnerabilities.

Both Dakin and Turk had many more valuable insights to share during our conversation – from why agency IT leaders should consider microservices architecture in pursuit of more robust cyber security to the importance of engendering a culture of security throughout an agency.   If you’re interested in hearing our full conversation you can catch it – and download a copy of the slides – here.

 

Tags: Chris HallenbackDepartment of Commerceendpoint securityGovernment CybersecurityPresidential Innovation FellowsRod TurkRoss DakinUS CERT

RELATED POSTS

IoT Devices
Security

As IoT Devices Put Government Agencies at Risk, Securing Endpoints Has Never Been More Important

March 11, 2021
iot
COVID-19

With More IoT Devices in Use, Cyberattacks are on the Rise

September 3, 2020
Endpoint Security Promotes Secure Teleworking for Agencies
COVID-19

Endpoint Security Promotes Secure Teleworking for Agencies

July 27, 2020

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5378 shares
    Share 2151 Tweet 1345
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    81 shares
    Share 32 Tweet 20
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us