Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Briefing Federal Agencies on the Insider Threat

by GTI Editors
June 17, 2014
in Cybersecurity
Reading Time: 2 mins read
A A
Share on FacebookShare on Twitter

When we talk about cybersecurity and the federal government we are usually referencing the myriad threats posed to national information security from external actors – that is nation states, international hacktivists groups, and cyber criminals. One often overlooked, but just as dangerous to national cybersecurity, are threats that come from the inside; just look at the damage that the Snowden revelations did to diplomatic relations and the ability to protect US interests at home and abroad.

However, the insider threat doesn’t necessarily mean a rogue individual within an organization whose primary objective is to steal information, expose data, or compromise national security. With the proliferation of endpoints as more and more agencies adopt mobile platforms and remote work environments, the threat from insiders can be as much accidental as it is deliberate. A lost tablet, or a stolen mobile phone can expose vast amounts of classified and confidential information vital to the functioning of the federal government and impact the privacy, safety, and security of citizens.

The risk from insiders, whether malicious or inadvertent, presents numerous challenges to federal agencies. In this brief, researched by Guidance Software, learn how to mitigate the risk of insider threats with endpoint analytics and incident response. Highlighted topics include early alerts, improving detection, access to endpoint data, protecting data as evidence, and matching remediation to protection needs. You can download a copy of the brief here…

Tags: cybersecuritydata breachData SecurityEdward SnowdenInsider Threat

RELATED POSTS

Identifying the Building Blocks for a Successful Zero Trust Journey
Civilian

Identifying the Building Blocks for a Successful Zero Trust Journey

January 24, 2023
Paving the Way to a More Secure Future: How Legislation Helps
Cybersecurity

Paving the Way to a More Secure Future: How Legislation Helps

January 12, 2023
Federal IT Priorities for FY23: Security, Defense, and Digital Government Experience Top the List
Cybersecurity

Federal IT Priorities for FY23: Security, Defense, and Digital Government Experience Top the List

January 10, 2023
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8273 shares
    Share 3309 Tweet 2068
  • The Department of Defense is Embracing a Holistic Approach to Transformation and Modernization

    30 shares
    Share 12 Tweet 8
  • The Five Pillars of Zero Trust Architecture

    332 shares
    Share 133 Tweet 83
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    16 shares
    Share 6 Tweet 4

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us