Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

What Does Your Agency’s Data Security Plan of Action Look Like?

by Chelsea Barone
July 30, 2020
in Cybersecurity
Reading Time: 4 mins read
A A
What Does Your Agency’s Data Security Plan of Action Look Like?
Share on FacebookShare on Twitter

Migrating to the cloud and optimizing operation in that environment have been top-of-mind for government agencies for some time, but now, as remote work becomes a part of life, these agencies are accelerating their efforts. As the government continues to move towards a cloud-powered work environment, many are leveraging a hybrid IT approach that is proving to be an effective and cost-efficient way for many of these agencies to manage the risk associated with the acceleration of migration. Naturally, finding the right data security and management approach are pressing components for agencies considering the level of sensitivity of the data being managed and the notoriety that follows if a breach should occur.

“Risks revolve around the security of an agency’s data no matter where it rests, whether that’s on-prem, in the cloud, or a combination of both,” stated Richard Breakiron, Commvault’s Senior Director, Strategic Initiatives – Fed, DoD and the Intelligence Community, in a conversation with Government Technology Insider. “Maintaining authoritative providence of the data as well as meeting compliance requirements is crucial, and a hybrid approach allows that level of visibility needed by these government agencies to keep their data secure.” Mission success is dependent on maintaining data’s immutability and source integrity.

While data visibility is undoubtedly an important factor in data security, the ability to monitor and prevent threats with sophisticated diagnostic and monitoring tools is the second part of that data security one-two punch. David DeVries, Senior Director, Strategic Initiatives – SLED at Commvault, explained to us that in order to truly optimize your data security approach, your IT systems need to be put to the test regularly to ensure the right protocols are in place.

“Cloud vendor built-in data protection simply isn’t enough,” DeVries said. “Government agencies need to be able to detect anomalies and handle them swiftly. They need to be able to quickly recover and restore data that’s crucial to their mission. They need to be able encrypt their data at the source. All of these are considerations that need to be made throughout their journey to the cloud. Often this extends in a day-to-day operational mode involving several storage types and locations.”

These specific needs speak directly to the mission of the Continuous Diagnostics and Mitigation (CDM) program from the Cybersecurity and Infrastructure Security Agency (CISA). The CDM program sources tools for government agencies to strengthen their cybersecurity strategy. These tools help continually identify cybersecurity risks and prioritize those risks based on projected impact, enabling data security decision makers to create a thoughtful plan of action in the event of a cyberattack.

So, what happens when (and it’s when, not if) a cyber-attack can’t be prevented? This is where an agency’s robust recovery plan and the regular IT system testing comes into play – and not surprisingly, central to that recovery plan is the ability to recover critical data. A whitepaper from Commvault, titled Secure Your Data, Your Recovery and Your Mission, outlines the steps to building a data security and recovery plan. According to the whitepaper, “True peace of mind comes from having a comprehensive, continuous recovery readiness plan. The last thing you want to do when contending with a high-pressure attack is to stop to figure out which data needs to be recovered in what order. Recovery readiness means that recovery stages are documented, automated, and predictable, and that a recovery plan is tested and rehearsed regularly.”

Data security comes with many different challenges and considerations, especially at a government level, so a plan of action for all phases of a cyberattack is not optional. You can learn more about how to build and maintain your agency’s plan of action for data security here.

Tags: CDMCISAcloudCommVaultcontinuous diagnostics and mitigationCyber AttackData SecurityDavid Devrieshybrid ITManaging DataMigrationRichard Breakiron

RELATED POSTS

Human Vulnerabilities
Cybersecurity

Human Vulnerabilities are at the Heart of Social Engineering Attacks

March 9, 2023
Infrastructure-as-a-Service is Transforming
Civilian

Infrastructure-as-a-Service is Transforming Cloud Solutions

January 31, 2023
CISA Issues Updated Guidance to Protect Federal Agencies Against Expected Onslaught of DDoS Attacks
Civilian

CISA Issues Updated Guidance to Protect Federal Agencies Against Expected Onslaught of DDoS Attacks

January 30, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9298 shares
    Share 3719 Tweet 2325
  • Fixed Wireless Access: Communications Infrastructure Podcast for the Public Sector

    72 shares
    Share 29 Tweet 18
  • Laid-off Tech Workers Find Unexpected Opportunities with Federal Government Contractors

    10 shares
    Share 4 Tweet 3

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us