Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Uncategorized

Podcast: Tailoring Cybersecurity Programs from the Inside: Part Two

by GTI Editors
October 28, 2016
in Uncategorized
Reading Time: 2 mins read
A A
podcast
Share on FacebookShare on Twitter

Cybersecurity efforts at a federal agency, while managed from the inside, must be designed to reduce vulnerability far outside the walls of a government building.  As citizens, “This is our future, our livelihood, our personal information, our personal and national security that’s at risk,” says Mr. Jay McCargo, President and CEO of ARServices.

Cybersecurity is a “zero defects type of business,” said McCargo. Recently, Mr. McCargo shared best practices and specific examples from the Defense Logistics Agency (DLA)  programs focused on Asset Management and Asset Visibility. We had the chance to continue our conversation with more examples of existing cybersecurity programs, this time at the Defense Threat Reduction Agency (DTRA) and the Defense Nuclear Facilities Safety Board (DNFSB).

ARServices has a twenty-three year history of supporting DTRA and its predecessor agencies, the Defense Nuclear Agency and the On-Site Inspection Agency. Although the work at DTRA is classified, McCargo was able to share an “Informed level of generalization” by advising on the specialized engineering and programmatic support that federal agencies need to address cybersecurity threats while meeting government requirements.

At the DNFSB, a DoD agency that performs an oversight role for the Department of Energy’s nuclear activities, McCargo’s firm has formed a new relationship focused on reducing risk and delivering service focused on being responsive and agile. “In my opinion, federal government does a great job of providing the kind of leadership that understands …risks and contingencies…” said McCargo. “It is the contractor’s responsibility to have program teams with the functional knowledge specific to an agency to support the government’s view.”

To hear more about how agencies can think clearly and plan effectively to ensure their cybersecurity program is successful, listen to the podcast below.

https://governmenttechnologyinsider.com/wp-content/uploads/2016/10/ARS-Oct21-Part2.mp3
Tags: ARServicesasset managementcybersecurityDefense Logistics AgencyDefense Nuclear Facilities Safety BoardDefense Threat Reduction AgencyDLADNFSBDTRAfederal contracting

RELATED POSTS

Identifying the Building Blocks for a Successful Zero Trust Journey
Civilian

Identifying the Building Blocks for a Successful Zero Trust Journey

January 24, 2023
Paving the Way to a More Secure Future: How Legislation Helps
Cybersecurity

Paving the Way to a More Secure Future: How Legislation Helps

January 12, 2023
Federal IT Priorities for FY23: Security, Defense, and Digital Government Experience Top the List
Cybersecurity

Federal IT Priorities for FY23: Security, Defense, and Digital Government Experience Top the List

January 10, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8340 shares
    Share 3336 Tweet 2085
  • For CBP and DHS, AI Reveals Meaningful Connections from Disparate Data

    17 shares
    Share 7 Tweet 4
  • The Five Pillars of Zero Trust Architecture

    340 shares
    Share 136 Tweet 85
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    22 shares
    Share 9 Tweet 6

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us