Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home CIO Perspective

What are the Most Critical Cyber Roles for Federal Agencies?

by Paul Parker
December 4, 2018
in CIO Perspective
Reading Time: 4 mins read
A A
federal agency
Share on FacebookShare on Twitter

The public sector faces an incredible number of cybersecurity threats and given that the government houses some of our most sensitive data the number of attacks will continue to grow. What’s worse than the number of attacks is that statistically, about one in three targeted attacks results in a security breach. As these breaches continue to grow more dangerous, it’s critical to identify and recruit the right personnel to ensure a stronger security posture.

Meeting that need head on, the Office of Personnel Management (OPM) has put out a call for data in order to identify the most vital cybersecurity needs across the federal agencies. Beginning in 2019, federal agencies will be required to submit reports annually through 2022. The OPM is asking agencies to:

1. Identify critically needed cybersecurity roles
2. Determine the root causes of cyber workforce shortages
3. Develop an action plan to combat those root causes

While this is a great step toward stronger agency security, what can federal IT pros do today to help combat increasing threats? Let’s start by examining where agencies feel the most vulnerable, then explore ways to help minimize these weak spots.

Enhancing the Technical Team
According to a recent report by Accenture, most government executives are confident their cybersecurity strategies are successfully protecting information and privacy. Yet, these same government executives are far less confident that they are successfully monitoring, identifying, and measuring breaches. In fact, most feel their current efforts to monitor, identify, and react to cybersecurity breaches are insufficient. In fact, more than half specifically mention cyberthreat analytics as a key cybersecurity gap.

Agencies should take this as a clear message to shore up in the Security Operations Center (SOC) and within agency leadership.

Let’s start in the SOC. Assume an agency already has a solid network and application monitoring platform—one that provides a unified view of all the information throughout the infrastructure. This is the most critical first step.

The platform by itself isn’t enough. Far too many people think software will do all the work—not true. Remember, this is your first line of attack against a breach of any sort. Understand your inventory (software, hardware, tools, people); understand the data that’s being stored and passing through these systems; and shore up the team tasked with monitoring, analyzing, and acting on the data being provided. Adding more highly-skilled staff or upskilling your current team should be your first priority.

It can be imperative to have a security management platform that can detect anomalies or abnormalities as well as the personnel to analyze and understand the implications of the information being provided.

Agency Leadership
The second half of the equation for a stronger cybersecurity posture is strong cybersecurity leadership.

The old adage that the tone of any organization comes from the top is absolutely true in the world of cybersecurity. Sound leadership should espouse good cyber hygiene and help to create a culture of cybersecurity awareness and diligence. Cybersecurity leaders should emphasize accountability, and build and support a strategy to make that possible.

Conclusion
There are two distinct approaches when considering where your agency can enhance its hiring and personnel support: the highly technical end, where experts can identify and act on anomalies before they become threats, and at the managerial end, where leaders can encourage and enable a culture of awareness, diligence, and accountability.

Tags: Accenture Cyber ReportCritical IT RolesCyber workforce planCyber workforce ShortagescybersecurityOffice of Personnel ManagementOPM

RELATED POSTS

Contributed Articles

Silent But Deadly: The Cybersecurity Risks of Quiet Quitting

March 9, 2023
collaborating on cybersecurity
Cybersecurity

Collaborating on Cybersecurity Best Practices Enables Federal Agencies to Combat Global Threats

March 8, 2023
Cybersecurity strategies for the Department of Defense represented by a phone with the DoD logo
Cybersecurity

Savvy Cybersecurity Strategies for the Department of Defense and CISA

March 2, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9396 shares
    Share 3758 Tweet 2349
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    18 shares
    Share 7 Tweet 5
  • Why the Government Needs a Cloud-Native Workforce

    9 shares
    Share 4 Tweet 2
  • The Five Pillars of Zero Trust Architecture

    435 shares
    Share 174 Tweet 109

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us