Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Podcast: Tailoring Cybersecurity Programs from the Inside: Part One

by GTI Editors
October 26, 2016
in Cybersecurity
Reading Time: 2 mins read
A A
podcast
Share on FacebookShare on Twitter

Managing IT assets around the world requires an eye on security for any organization. For federal agencies performing work OCONUS (outside the continental United States), cybersecurity programs and procedures must be managed from inside the government enclave, meaning that all efforts to maintain mission effectiveness must be performed by personnel in federal buildings or approved contractor facilities, and information must be confined within the agency’s network whenever possible.

Every October, National Cyber Security Awareness month gets us thinking about the ever expanding list of ways our national security and personal information can be vulnerable to cyber attack. The purpose of the month-long campaign is awareness, not fear, so we sought out some real life programs at federal agencies that are effectively addressing cybersecurity at a programmatic level supported by long-term thinking. As required, the federal cybersecurity programs we found are all managed from inside.

We asked Mr. Jay McCargo, President and CEO of ARServices, to share some specific examples of federal cybersecurity programs: the current challenges they must address, the types of programs that protect cybersecurity concerns, and the ways each agency can tailor their approach. McCargo’s firm, ARServices, manages several cybersecurity contracts, including managing programs for the Defense Logistics Agency (DLA), the Defense Threat Reduction Agency (DTRA) and the Defense Nuclear Facility Safety Board (DNFSB).

Although “There’s no one size fits all solution,” McCargo cautions, our conversation revealed some ways of thinking and some programmatic best practices that other agencies can use.  In the first of a two-part podcast, we focused on DLA’s Asset Management and Asset Visibility programs.

Listen to the podcast below to learn more about DLA’s cybersecurity approach, which includes the responsiveness and agility needed for an OCONUS program:  office hours and duty hours that correspond to the local theater.

http://governmenttechnologyinsider.com/wp-content/uploads/2016/10/ARS-Oct21-Part1.mp3
Tags: ARServicesasset managementcybersecurityDefense Logistics AgencyDLAfederal contracting

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5356 shares
    Share 2142 Tweet 1339
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    40 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    11 shares
    Share 4 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us