Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Four Cyber Priorities for Government Leaders

by Lloyd McCoy Jr.
June 17, 2016
in Cybersecurity
Reading Time: 4 mins read
A A
Four Cyber Priorities for Government Leaders
Share on FacebookShare on Twitter

With a 35 percent bump in cybersecurity funding in the President’s proposed FY17 budget, agencies will be able to grow their arsenal against cyber adversaries. So what’s on the wish lists of federal IT leaders? Everything from more robust training for federal employees to changing how government data is accessed.

A panel of federal IT leaders at this month’s Executive Leadership Forum: Mitigating Data Risks in a Virtual World, revealed some of those priorities. The event was held at McLean, Va.-based immixGroup, an Arrow company that helps technology companies do business with the government.

Here are four ways these leaders would direct their FY17 cyber funds:

  1. Get Out of the ‘60s

Most of the VA’s health care systems are based on a software development architecture from the late 60s, says Dr. Joseph Ronzio, deputy chief health technology officer at the Veterans Health Administration (VHA). The agency has been trying to modernize its systems internally for years. So it’s no surprise that Ronzio’s cyber wish list includes moving to newer technologies. One way VHA has been doing that is testing cutting-edge technology through the agency’s cloud-based test platform. It’s a shared risk model, where it may not be the vendor’s best and brightest idea yet, but VHA can help develop it. “You can show us how your product can help my aging systems,” says Ronzio. “We can actually leap frog ahead of where we’re at today and buy something truly early stage in its development.”

  1. Make Cybersecurity Part of Federal DNA

The biggest vulnerability in protecting government data and networks is the people working within the government, says Richard Young, chief information officer at the Foreign Agriculture Service for USDA. His cyber wish list includes going beyond traditional cyber training for employees and testing their real-time reactions to scripted cyber threats when they least expect them. He wants to engrave cybersecurity into the DNA of his workforce. “After the OPM breach, everyone was on full alert, but it’s now already starting to die down,” Young says. “I’m looking for creative ways to make it stay on the forefront of their minds.”

  1. Partner with the Right Talent

The government’s best change of tackling cybersecurity is looking at it as a partnership between program areas, business areas, and the CIO offices, says Chad Tompkins, data section chief of the Consumer Financial Protection Board. It also means hiring the right people because, “If you can’t secure the data or can’t understand where it’s going, who has it and what’s going on with it, then you’re flying with your pants down,” Tompkins says.  His 20-person team includes two former chief enterprise architects and a person who ran a secured facility for the Department of Defense. “It’s not just a partnership in words, but in who you hire and how they’re trained and their expertise,” says Tompkins.

  1. Strengthen the Gates

Every time there’s a data breach, it makes it easier for adversaries to carry out the next data breach, says Sonny Bhagowalia, chief information officer for the Treasury Department. Many organizations use knowledge-based authentication to secure their networks, and the adversary collects loads of information with every breach. Bhagowalia says there needs to be a shift toward two-factor multi-factor authentication to better protect the networks. “We have to make access to data convenient, but with information from other breaches, adversaries are able to get certain things from our networks without ever entering the gates,” Bhagowalia says.

Lloyd McCoy Jr. is a Market Intelligence Consultant with immixGroup (an Arrow company), which helps technology companies do business with the government. He specializes in the Defense Department and cybersecurity. If you want to learn more you can email him or connect with him on LinkedIn.

 

Tags: cyber securityCyber TrainingcybersecurityFY17 CyberfundingimmixGroupVeterans Affairs CybersecurityVeterans Health Administration

RELATED POSTS

secure cloud communications represented by a hand holding a cloud with various symbols representing communication things
Cybersecurity

How to Enhance and Secure Cloud Communications Between Agencies

March 30, 2023
FedRAMP is the Foundation of Trusted and Secure Government
Acquisition

FedRAMP is the Foundation of Trusted and Secure Government

March 29, 2023
Contributed Articles

What’s Missing from the National Cyber Strategy? Speed, Funding, and Accountability

March 23, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9454 shares
    Share 3782 Tweet 2364
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    98 shares
    Share 39 Tweet 25
  • FedRAMP is the Foundation of Trusted and Secure Government

    57 shares
    Share 23 Tweet 14
  • Why the Government Needs a Cloud-Native Workforce

    25 shares
    Share 10 Tweet 6

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us