Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Automated Cyber Tools: Navy CISO and GAO Director, Center for Enhanced Cybersecurity Discuss Importance to Federal Agencies

by Jackie Davis
October 1, 2020
in Cybersecurity, Defense & IC, Digital Transformation, Hybrid Work
Reading Time: 6 mins read
A A
automated cybertools
Share on FacebookShare on Twitter

The public sector threat landscape is constantly growing. With an increasing number of endpoints due to remote work and evolving architecture, agencies are vulnerable to a variety of threats. From ransomware to phishing, agencies must defend their endpoints and networks from bad actors looking to infiltrate systems and steal valuable data. Agencies can defend their growing networks with a combination of automated cyber tools and a knowledge of current threats.  

Recently, Chris Cleary, Chief Information Security Officer, Department of the Navy, Gary Austin, Assistant Director, Center for Enhanced Cybersecurity, Government Accountability Office, and Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation, came together to explore how agencies can overcome these challenges by utilizing tools that are built to secure the mission. These experts discussed the importunate of endpoint security, staying current of global cyber threats, and the importance of automated tools, and most importantly, answered the question on every agencies’ mind: How do you build an effective system?

Watch the Webinar  

The answer lies in Intelligence–led validation. Matthews shared that security controls are in a constant state of degradation. With intelligence–led validation, an automated tool, testing, patching, and defending is handled, so security controls are kept up to protect data and networks. Although most agencies are striving to do this manually, they’re missing updates and tests that leave room for bad actors to sneak in, explained Austin.

“I don’t think the C-level executives at agencies really understand what the threat is,” said Austin. These security issues are of utmost importance, but they don’t always have budget dollars dedicated to their upkeep. “It seems like we are still back in the early 2000s with a lot of these issues.” And, the recent Security Effectiveness Report by FireEye Mandiant echoes Austin’s concerns.  

As a country “we are having a cyber hygiene problem. Sixty-seven percent of the testing attacks were not being prevented, 74 percent of these attacks went undetected, and more concerning to me, is that when the event book is complete, only 9 percent of the attacks are actually being correlated back at the SIEM,” said Matthews, discussing data from the report.

Cleary explained that these issues stem from a lack of understanding and appropriate tools. Agencies are having trouble implementing the right technology to keep systems and networks up to date. Missed patching and accidental misconfiguration are just a few of the areas weakening cyber defenses. To build a strong cybersecurity posture and improve cyber hygiene, agencies should look to automated technologies that rely on machine learning and artificial intelligence to verify users and systems – protecting every aspect of the agency.

“The best that we can do is see the end goal as more of the horizon,” said Cleary. It’s a learning and growing process, a moving strategy,” he said. And agencies need tools that can move and grow with them, he concluded.

It’s time to bolster cyber defenses. Click here to learn more from the experts.

Tags: cybersecurityFireEyeGAOIntelligence-led ValidationMandiantnavySecurity Effectiveness Report

RELATED POSTS

Contributed Articles

Silent But Deadly: The Cybersecurity Risks of Quiet Quitting

March 9, 2023
West 2023: US Navy Focuses on Collaboration on the Battlefield of the Future
Defense & IC

West 2023: US Navy Focuses on Collaboration on the Battlefield of the Future

March 9, 2023
collaborating on cybersecurity
Cybersecurity

Collaborating on Cybersecurity Best Practices Enables Federal Agencies to Combat Global Threats

March 8, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9333 shares
    Share 3733 Tweet 2333
  • Laid-off Tech Workers Find Unexpected Opportunities with Federal Government Contractors

    13 shares
    Share 5 Tweet 3
  • The Five Pillars of Zero Trust Architecture

    430 shares
    Share 172 Tweet 108

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us