Industry experts, including CISA and U.S. Army Cyber Command leaders, met to discuss the cybersecurity challenges surrounding the hybrid work environment. Continue reading to learn how the proliferation of endpoints in these environments need to be identified in order to be cyber-secure and protect agency data.
The move to the hybrid work environment multiplied the number of endpoints that federal agencies need to secure. This workforce evolution has brought many cybersecurity challenges to light for agencies and compelled them to identify new solutions that are fit for today’s mission. For instance, first responders can use deployed devices and network assets that can help them remain connected when helping towns recover from natural disasters. Services like this allow for quick, secure responses that deliver critical assistance and mission success. Recently, a group of cybersecurity experts from both the public and private sectors met to discuss how to secure hybrid work environments in a volatile threat environment. The group included:
- Ron Pontius, Deputy to the Commander, U.S. Army Cyber Command
- Robert Costello, Chief Information Officer, Cybersecurity and Infrastructure Security Agency
- David Cerjan, Managing Director, National Security Group, Verizon
- Mark Sincevich, Federal Director, Illumio
- Jim Richberg, Field CISO, Public Sector, Fortinet
With the proliferation of endpoints as a result of the hybrid work evolution, agencies need to identify solutions that can secure vital data and systems regardless of their location. David Cerjan, Managing Director, National Security Group, at Verizon shared that it’s vital for agencies not just to secure data, but to secure people as well. With agency work now happening from multiple locations and not just central offices “it is important that our mission-critical people are engaged and secure with hybrid operations.”
For Ron Pontius, Deputy to the Commander, U.S. Army Cyber Command, collaboration tools will benefit cybersecurity and improve effectiveness and efficiency for the warfighter whether they are on base or in another location. The Army uses a big data platform to analyze security incidents over the past year to understand behavior and find the initial indication of compromise. Pontius shared that the platform can also be leveraged “to look at ourselves, from the external view, which is incredibly important. We bring that together with the internal perspective and use it in our operations center to understand and respond faster.”
While big data platforms are one tool in the hybrid work environment cybersecurity toolbox, Cerjan discussed how mobile edge computing (MEC), can enhance security for agencies. MEC brings the agency’s data closer to where it is generated rather than requiring it to be moved back to a centralized data warehouse and being exposed to vulnerabilities while in transit.
Costello commented that partnerships within the industry are greatly beneficial by using solutions, like MEC, that can transform operations and network security. For instance, in addition to helping connected cities and bases, where hybrid workers become the edge, MEC can help with first responder operations. For example, during Hurricane Ida, first responderswere able to use MEC to secure when helping those in need. Cerjan commented, “this is about securing information and having a reliable network to do what you need to do while not compromising security. Agencies can engage individuals to ensure they get the necessary information to make command decisions promptly and make sure that it is secure and forward-leaning.”
Agencies can implement solutions today that can significantly impact the future. With the need to accelerate the protection of people, data, and things on the edge, agencies need to start internally and secure their networks. Partnerships within the industry can be greatly beneficial with solutions that are proven to transform operations and improve network security. As hybrid environments become the norm, agencies need to develop solutions that provide the resources to protect their data assets from threats.
To learn more about cybersecurity and hear from these industry experts, click here.