Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Civilian

CISA and U.S. Army Cyber Command Leaders Discuss Cybersecurity Challenges in the Hybrid Work Environment

by Kelsey Winick
November 17, 2022
in Civilian, Cybersecurity, Defense & IC, Hybrid Work, Network Modernization, State & Local, Transformative Tech
Reading Time: 5 mins read
A A
CISA
Share on FacebookShare on Twitter

Industry experts, including CISA and U.S. Army Cyber Command leaders, met to discuss the cybersecurity challenges surrounding the hybrid work environment. Continue reading to learn how the proliferation of endpoints in these environments need to be identified in order to be cyber-secure and protect agency data.

The move to the hybrid work environment multiplied the number of endpoints that federal agencies need to secure. This workforce evolution has brought many cybersecurity challenges to light for agencies and compelled them to identify new solutions that are fit for today’s mission. For instance, first responders can use deployed devices and network assets that can help them remain connected when helping towns recover from natural disasters. Services like this allow for quick, secure responses that deliver critical assistance and mission success. Recently, a group of cybersecurity experts from both the public and private sectors met to discuss how to secure hybrid work environments in a volatile threat environment. The group included:

  • Ron Pontius, Deputy to the Commander, U.S. Army Cyber Command
  • Robert Costello, Chief Information Officer, Cybersecurity and Infrastructure Security Agency
  • David Cerjan, Managing Director, National Security Group, Verizon
  • Mark Sincevich, Federal Director, Illumio
  • Jim Richberg, Field CISO, Public Sector, Fortinet
Watch the Webinar Here

With the proliferation of endpoints as a result of the hybrid work evolution, agencies need to identify solutions that can secure vital data and systems regardless of their location. David Cerjan, Managing Director, National Security Group, at Verizon shared that it’s vital for agencies not just to secure data, but to secure people as well. With agency work now happening from multiple locations and not just central offices “it is important that our mission-critical people are engaged and secure with hybrid operations.”

For Ron Pontius, Deputy to the Commander, U.S. Army Cyber Command, collaboration tools will benefit cybersecurity and improve effectiveness and efficiency for the warfighter whether they are on base or in another location. The Army uses a big data platform to analyze security incidents over the past year to understand behavior and find the initial indication of compromise. Pontius shared that the platform can also be leveraged “to look at ourselves, from the external view, which is incredibly important. We bring that together with the internal perspective and use it in our operations center to understand and respond faster.”

While big data platforms are one tool in the hybrid work environment cybersecurity toolbox, Cerjan discussed how mobile edge computing (MEC), can enhance security for agencies. MEC brings the agency’s data closer to where it is generated rather than requiring it to be moved back to a centralized data warehouse and being exposed to vulnerabilities while in transit.

Costello commented that partnerships within the industry are greatly beneficial by using solutions, like MEC, that can transform operations and network security. For instance, in addition to helping connected cities and bases, where hybrid workers become the edge, MEC can help with first responder operations. For example, during Hurricane Ida, first responderswere able to use MEC to secure when helping those in need. Cerjan commented, “this is about securing information and having a reliable network to do what you need to do while not compromising security. Agencies can engage individuals to ensure they get the necessary information to make command decisions promptly and make sure that it is secure and forward-leaning.”

Agencies can implement solutions today that can significantly impact the future. With the need to accelerate the protection of people, data, and things on the edge, agencies need to start internally and secure their networks. Partnerships within the industry can be greatly beneficial with solutions that are proven to transform operations and improve network security. As hybrid environments become the norm, agencies need to develop solutions that provide the resources to protect their data assets from threats.

To learn more about cybersecurity and hear from these industry experts, click here.

Tags: CISAcybersecurityFederal Executive ForumHybrid WorkMECMobile Edge ComputingU.S. Army Cyber CommandVerizon

RELATED POSTS

A representation of digital inclusion - a sky with a cityscape behind and a bunch of technological devices and figures represented in circles and connected in the sky
Digital Transformation

Digital Inclusion Initiatives Target Digital Divide

January 27, 2023
Identifying the Building Blocks for a Successful Zero Trust Journey
Civilian

Identifying the Building Blocks for a Successful Zero Trust Journey

January 24, 2023
Paving the Way to a More Secure Future: How Legislation Helps
Cybersecurity

Paving the Way to a More Secure Future: How Legislation Helps

January 12, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8274 shares
    Share 3310 Tweet 2069
  • The Department of Defense is Embracing a Holistic Approach to Transformation and Modernization

    30 shares
    Share 12 Tweet 8
  • The Five Pillars of Zero Trust Architecture

    332 shares
    Share 133 Tweet 83
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    16 shares
    Share 6 Tweet 4

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us