Making CSIP Work For Your Agency
Thursday’s GovLoop webinar covers how agencies can use the Cybersecurity Strategy and Implementation Plan to guide their own security strategies.
Thursday’s GovLoop webinar covers how agencies can use the Cybersecurity Strategy and Implementation Plan to guide their own security strategies.
In an interview with GovLoop, Jordan shared his experiences as Arlington County’s CISO and insights on needed improvements in the state and local cyber workforce.
Yes, Passwords are Secure! They are not going away; they can’t. The attacks we see daily is not a password authentication problem, but rather a password management nightmare. Has your organization put their employees into the role of Network Security Administrator? If you allow them to generate, remember, type, manage and know their logon passwordsRead… Read more »
It’s not every day the Department of Defense invites people to hack its networks with no fear of repercussion. But that’s exactly what they’ve done—and good for them.
Learn how to organize your content so that it remains secure.
Arlette Hart is the chief information security officer (CISO) at the Federal Bureau of Investigation. As CISO of the FBI, she has a unique perspective. On the one hand, she is tasked with securing vast amounts of highly sensitive information. On the other, she has the inside track on the emerging cyber-threats, and some ofRead… Read more »
To keep pace with the frequency and sophistication of evolving cyberthreats, agencies can’t rely on reactive security defenses and techniques. What agencies need is a layered security defense that ensures they’re prepared to quickly detect and thwart malicious actors before they wreak havoc on government networks.
Learn how to combat cybersecurity threats.
Best practices for mitigating both intentional and accidental insider threats within government organizations.
Analysts can work more efficiently now because they aren’t flooded with a sea of security alerts that realistically can’t all be addressed at the same time. Using analytics, they can prioritize anomalies and understand what data is leaving the network in an unauthorized way.