Cyber Effects Information
Informations ensure that agency stakeholders are aware of data security risks.
In the past 90 days alone, several major attacks on federal agencies have made the news.
Foreign state actors used anti-virus software to steal sensitive material on U.S. cybersecurity capabilities from one government agency, and another reported a breach.
Cisco’s 2017 Annual Cybersecurity Report found that the majority (54 percent) of public sector organizations still take a project-based approach to purchasing security solutions.
This is a reactionary approach and addresses problems only after they occur.
However, by establishing a proactive cybersecurity strategy, leaders can shorten time to detection, respond to security events faster and better mitigate the impact of a breach.
The relevant question now: Is the risk associated with that information worth an additional security investment, or is there room for risk management?
For instance, if a certain employee group primarily accesses the information remotely, then the agency might consider improving its mobile security protocols.
Once an agency identifies its valuable information, understands how that information is used and pinpoints ways to protect that information, it can then execute against a cybersecurity strategy that proactively responds to security events and best mitigates the impact of breaches.
To read the full article check here