One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 293986
Date de publication 2017-01-17 14:00:00 (vue: 2017-01-17 14:00:00)
Titre The Priority of the Government/Industry Cybersecurity Partnership
Texte The change in the cyber risk environment coinciding with a heightened need for procurement of new technologies and services has created a new paradigm for a cybersecurity partnership between government and industry. The prioritization of that special partnership appears to be in the immediate plans for the new Trump Administration. The appointment of former NYC Mayor Rudy Giuliani as a cybersecurity adviser signals the elevated importance of that intended government/industry partnership. One of his first tasks will be to assemble cybersecurity subject matter experts and leaders from industry to advise and spur innovation in and out of government. Mayor Giuliani has made it clear that the proposed group will work on cutting-edge cybersecurity solutions across industries such as the energy, financial, and transportation sectors. Collaboration between government and industry stakeholders is a proven model that makes good sense. Together, government and the private sector can identify products and align flexible product paths, evaluate technology gaps, and help design scalable architectures that will lead to greater efficiency and fiscal accountability. Bridging R&D spending between the government and private sectors should also allow for a more directed and capable cybersecurity prototype pipeline to meet new technology requirements. In addition to being collaborative, a working partnership of government and industry leaders should be focused and strategic in nature. To be effective the evolving cybersecurity partnership must also be 1) proactive and adaptive to change; 2) coordinated with The Department of Homeland Security (DHS); and 3) have a cyber risk management/consequence strategy. Being Proactive and Adaptive to Change: There are many challenges of functioning in an exponentially changing digital world. This requires restructuring of priorities and missions for both government and industry. That is not an easy task and there is logic in joining forces. As the capabilities and connectivity of cyber devices have grown, so have the cyber intrusions and threats from malware and hackers. The growing and sophisticated cyber threat actors include various criminal enterprises, loosely affiliated hackers, and adversarial nation states. A first mission for the new Administration’s cyber team will be to review recommendations prepared by cybersecurity experts from within and out of government and to assess gaps and vulnerabilities across the threat landscape. In the past decade, the cybersecurity focus and activities by both government and industry have been predominantly reactive to whatever is the latest threat or breach. As a result, containing the threats was difficult because at the outset, defenders were always at least one step behind. That mindset has been changing due to a major series of intrusions and denial of service attacks (including OPM, Anthem, Yahoo, and many others) that exposed a flawed approach to defending data and operating with a passive preparedness. Being proactive is not just procuring technologies and people it also means adopting a working industry and government framework that includes tactical measures, encryption, authentication, biometrics, analytics, and continuous diagnostics and mitigation, as applicable to specific circumstances. The new advisory council led by Mayor Giuliani will become more proactive and adaptive in protecting assets and will also likely address policy and technology development implications around a whole host of other topics related to cyber threats. Some of these topics will include information sharing, securing the Internet of Things (IoT), protection of critical infrastructures, and expanding workforce training to mitigate the shortage of cybersecurity The Department of Homeland Security’s (DHS) Coordination: The government/industry partnership will have to work closely with the Department of Homeland Security. DHS has taken on a formal and increasing
Envoyé Oui
Condensat      related “cybersecurity “the 13th 2016 2017 2017the 450 about abreast academia academy accountability across activities actors adaptive added addition address addressing adjunct administration administration’s adopting adversarial advise adviser advisor advisory afcea affiliated after against agency agency’s aimed align all allow also always analysis analytics anthem anything appears applicable appointment approach appropriated approved architectures are area arlen around aspects assemble assembling assess assessing assets attacks authentication author automated awards aware awareness because become been behind being best between beyond bill billion biometrics boards bossert both breach breaches bridges bridging brightest bring brooks budget build buildings called can capabilities capable capitol center certainly certificate chairman challenges change change: change; changing chemical chicago chuck circumstances civilian clear closely coinciding collaboration collaborative commerce commercial committee communication comptia’s congress congressional connected connectivity consequence/risk consequences containing contingencies continuity continuous contributions coordinated coordination: core corporate corporations council course covering created crimes criminal critical currently cutting cyber cybersecurity dams data day decade defenders defending defense defining demonstrating denial department depauw deployment design develop developed developing development devices dhs dhs’s diagnostics difficult digital dimensional directed directive director directorate directoratee dod dtic due easy ecosystem edge effective efficiency effort electric elements elevated emerging encompasses encryption energy enforcement enhancing ensuring enterprises environment especially establishes evaluate everything evolves evolving excellence executive expand expanded expanding expert experts exponentially exposed eye faculty far financial first fiscal flawed flexible focus focused follow forces formal former foundation framework from functioning further gaps gates giuliani goal good government government/industry graduate greater group growing grown hackers hague happen has have hdiac heightened help highways hill his homeland hopkins hospitals host house identify identifying immediate implications importance important incident include includes including incorporation increasingly industries industry information infrastructure infrastructures initiative innovation input insider institute integral integrating intended international internet intrusion intrusions involved iot issued issues january john johns joining just keep kelly landscape larger late latest law lead leaders leadership learn learned least led legislative lessons likely linkedin linkedin” local logic loosely made major makes malware management management/consequence mandates manufacturing many marketer marketing matter may mayor means measures meet melinda member members million mindset mission missions mitigate mitigation model more morphing multi must named nation nation’s national nature need networks new nist not nppd nyc obama one operating operational operators opm order organization organizations other others out outlined outset over owners paradigm partisan partner partnership passive past paths people personnel phishing pipeline pipelines plan planning plans plants policy political potential ppd practices predominantly prepared preparedness president presidential prevention previously priorities prioritization priority private proactive procurement procuring product products programs proposed proposes prospective protect protecting protection protocols prototype proven public public/private purple put r&d ransomware ransomware  reaches reactive really recent recommendations recovery redundant refine related relations remediation reorganize replace requirements requires resilience response restructuring result review risk role rudy scalable scenarios science secretary secrets sector sect
Tags Guideline
Stories Yahoo
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: