Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Podcast: Tailoring Cybersecurity Programs from the Inside: Part One

by GTI Editors
October 26, 2016
in Cybersecurity
Reading Time: 2 mins read
A A
podcast
Share on FacebookShare on Twitter

Managing IT assets around the world requires an eye on security for any organization. For federal agencies performing work OCONUS (outside the continental United States), cybersecurity programs and procedures must be managed from inside the government enclave, meaning that all efforts to maintain mission effectiveness must be performed by personnel in federal buildings or approved contractor facilities, and information must be confined within the agency’s network whenever possible.

Every October, National Cyber Security Awareness month gets us thinking about the ever expanding list of ways our national security and personal information can be vulnerable to cyber attack. The purpose of the month-long campaign is awareness, not fear, so we sought out some real life programs at federal agencies that are effectively addressing cybersecurity at a programmatic level supported by long-term thinking. As required, the federal cybersecurity programs we found are all managed from inside.

We asked Mr. Jay McCargo, President and CEO of ARServices, to share some specific examples of federal cybersecurity programs: the current challenges they must address, the types of programs that protect cybersecurity concerns, and the ways each agency can tailor their approach. McCargo’s firm, ARServices, manages several cybersecurity contracts, including managing programs for the Defense Logistics Agency (DLA), the Defense Threat Reduction Agency (DTRA) and the Defense Nuclear Facility Safety Board (DNFSB).

Although “There’s no one size fits all solution,” McCargo cautions, our conversation revealed some ways of thinking and some programmatic best practices that other agencies can use.  In the first of a two-part podcast, we focused on DLA’s Asset Management and Asset Visibility programs.

Listen to the podcast below to learn more about DLA’s cybersecurity approach, which includes the responsiveness and agility needed for an OCONUS program:  office hours and duty hours that correspond to the local theater.

https://governmenttechnologyinsider.com/wp-content/uploads/2016/10/ARS-Oct21-Part1.mp3
Tags: ARServicesasset managementcybersecurityDefense Logistics AgencyDLAfederal contracting

RELATED POSTS

Contributed Articles

Silent But Deadly: The Cybersecurity Risks of Quiet Quitting

March 9, 2023
collaborating on cybersecurity
Cybersecurity

Collaborating on Cybersecurity Best Practices Enables Federal Agencies to Combat Global Threats

March 8, 2023
Cybersecurity strategies for the Department of Defense represented by a phone with the DoD logo
Cybersecurity

Savvy Cybersecurity Strategies for the Department of Defense and CISA

March 2, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9327 shares
    Share 3731 Tweet 2332
  • Fixed Wireless Access: Communications Infrastructure Podcast for the Public Sector

    73 shares
    Share 29 Tweet 18
  • Laid-off Tech Workers Find Unexpected Opportunities with Federal Government Contractors

    11 shares
    Share 4 Tweet 3

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us