Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Podcast: How to Secure Today’s Data in Legacy Systems

by GTI Editors
July 25, 2016
in Cybersecurity
Reading Time: 2 mins read
A A
podcast
Share on FacebookShare on Twitter

Federal CIOs have an extremely large and complex workload, which is more difficult as data storage mediums continue to change and evolve. To keep important data secure and accounted for, these government leaders should keep a few key points in mind, according to James Yeager, Federal Director for Tanium.

In his third podcast with Federal Technology Insider, Yeager discusses how CIOs keep information secure in today’s rapidly evolving IT environment and as the need for increased data storage multiplies exponentially. A major imperative is that all CIOs must have is situational awareness.

A successful CIO must be able to identify, manage and secure data, but sometimes that is difficult in situations where legacy systems and lack of insight hinder effective data management. In those situations, a CIO must understand how to limit interaction with infrastructure through containment of data. This becomes increasingly important in today’s attack environment, in which agencies must realize that the approach isn’t “If we get attacked,” but, rather, “When we get attacked.”

In recent high-profile attacks, Yeager says, “There was a lack of an effective plan for how the organization responded under duress.” Therefore, urgency becomes necessary. According to Yeager, government spending should be focused towards tools that can act with urgency as well as sustainability. While some tools can act with unprecedented speed, they will prove ineffective for government agencies because they are unable to sustain that speed at the scale of large government operation.

Hear what Yeager has to say about cybersecurity at government agencies in his podcast.

Want to listen to Yeager’s other podcasts? 

HOW FITARA IS IMPROVING THE FEDERAL CYBER SECURITY LANDSCAPE

IT MODERNIZATION AND THE BATTLE FOR FEDERAL FUNDING

Tags: accountabilityAcquisitionsCIO’scloudCompromising datadata breach investigationsfundinggovernment spendingIT modernizationLegacy Systemsmalware

RELATED POSTS

The Department of Defense is Embracing a Holistic Approach to Transformation and Modernization
Defense & IC

The Department of Defense is Embracing a Holistic Approach to Transformation and Modernization

January 19, 2023
Contributed Articles

The Importance of Modernizing Legacy Systems in American Infrastructure

January 16, 2023
The Army’s Logistics Management Program Migration Delivers Transformation Without Disrupting the Mission
Cloud

The Army’s Logistics Management Program Migration Delivers Transformation Without Disrupting the Mission

January 12, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8274 shares
    Share 3310 Tweet 2069
  • The Department of Defense is Embracing a Holistic Approach to Transformation and Modernization

    30 shares
    Share 12 Tweet 8
  • The Five Pillars of Zero Trust Architecture

    332 shares
    Share 133 Tweet 83
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    16 shares
    Share 6 Tweet 4

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us