Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Civilian

Cybersecurity Trends for 2H 2022: Industry Expert Jeff Franckhauser Focuses on Zero Trust

by Kat Samiljan
July 27, 2022
in Civilian, Cybersecurity, Defense & IC, State & Local
Reading Time: 4 mins read
A A
Man with hand out. Orbity thing with a key in the middle, representingCybersecurity Trends for 2H 2022
Share on FacebookShare on Twitter

Every 11 seconds a ransomware attack occurs somewhere in the world, according to research from Cybersecurity Ventures magazine. Staying ahead of cyberattacks requires agencies to monitor and understand current trends that are perpetually evolving as threats evolve. Government Technology Insider recently talked with SHI International Field Solutions Engineer, Jeff Franckhauser, to discuss current trends, especially those that have risen with the push for Zero Trust infrastructures and the ongoing war in Ukraine. Franckhauser also shared some insight into what agencies are doing and can do to combat the ever-increasing number and sources cyber threats. Keep reading for Franckhauser’s expert thoughts on cybersecurity trends in 2H 2022.  

Government Technology Insider (GTI): What trends are you currently seeing in the cybersecurity space?  

Jeff Franckhauser (JF): Federal, state, and local governments, including K-12 and higher education, are understandably focusing on Zero Trust frameworks at all levels of their computer, storage, and communication network infrastructure. 

GTI: What’s a Zero Trust Framework?

JF: A Zero Trust framework essentially means that no one and no system should be granted access to the network or IT systems inside or outside an organization, unless they are being continuously authenticated and monitored.

This Zero Trust policy was driven by the Biden administration under the May 2021 Executive Order (EO) on Improving the Nation’s Cybersecurity as a result of the persistent threat of malicious actors carrying out cyberattacks. This EO is designed to support control for ransomware, DDoS attacks, virus and malware propagating across global networks and web applications, as well as protecting software code in and out of the cloud, and many other security flaws and issues facing government and institutions today.  

GTI: What does Zero Trust look like in action?

JF: Zero Trust is designed to address three security concepts visibility, analytics, and automation, with an eye toward identifying the end-user, sanitizing data, improving workload authorized access, and monitoring devices and encrypted data. In meeting these requirements, many agencies and educational institutions will need a comprehensive approach to security and security policy, meaning the sum of the parts must equal the whole and that secure technology and policy must support and protect the agency or institution at all levels, both public and private. 

CISOs and security professionals whose organizations are required to adopt this framework must first take a solid look at their current security foundation.  For a full picture of their security foundation, they need to take a step back and perform an internal security posture review, an analytical and practice deep dive. This security analysis allows professionals a broad overview of the current state of their cybersecurity technology hardware, software, policies, and procedures that define their either secure or unsecure platforms. With this evaluation, security professionals can look across their networks or operational federated networks and see what technology they have in place. Moreover, it enables them to understand what may need to be improved, updated, or replaced, and helps them answer the question of whether the new or advanced technology meets the standards for data reporting, governance, and compliance. 

Jeff Franckhauser dives into more trends and explains how the war in Ukraine is impacting cyber security in part two of our interview. Click to read Franckhauser’s thoughts here.

Tags: AutomationCybersecurity TrendsRansomwareSHI InternationalZero Trust

RELATED POSTS

Cybersecurity Trends
Civilian

Cybersecurity Trends for the Public Sector: Expert Insights and Guidance for Mitigation

August 2, 2022
shifting landscape of cybersecurity with a shield representing security.
Civilian

The Shifting Landscape of Cybersecurity and the Impact of War in Ukraine

July 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5933 shares
    Share 2373 Tweet 1483
  • Agencies Face Challenges in Identity Verification: Part 1 of the No Identity Left Behind Podcast

    20 shares
    Share 8 Tweet 5
  • Private Wireless Networks Support the Department of Defense’s Evolving Mission

    17 shares
    Share 7 Tweet 4
  • Building Effective Disaster Response Through Better Communication and Collaboration

    95 shares
    Share 38 Tweet 24
  • How the Navy and Marine Corps Will Benefit from NGEN-SMIT

    100 shares
    Share 40 Tweet 25

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us