Federal Agencies Like DHS Look Ahead to Strengthening Security and Reliability of Federal Information Systems
For an agency like the Department of Homeland Security (DHS), which plays a leadership role across government in securing our country’s cyberspace, assessing these new and evolving cybersecurity risks and coming up with a plan to fundamentally change and strengthen the security and reliability of our Federal information systems and the nation’s critical infrastructure is not an easy challenge. This is especially true as the adversaries now include nation states who have deep resources and continue to grow bolder in their cyber attacks on national information systems and critical infrastructure.
Blueprint for DHS’ Zero Trust and Data Protection Strategy
Today, the traditional perimeter has dissolved and cyber activity once easy to define as “good” or “bad” has become nebulous. This poses a crushing problem to threat-centric security, whose static policies are forced to make decisions about cyber activity with no insight into its broader context.
If we look at how cybersecurity has traditionally been approached up to this point, it’s centered on threat-centric responses. You built a wall around your perimeter, controlled access in and out of that wall, and when something bad happened, you responded. That was effectively your defense, and it was relatively easy to implement.
As we look to solve these challenges, it is important to consider the importance of cognitive science and cybersecurity, the role of continuous risk adaptive security, and how Zero Trust Architectures may help.
The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation.
Wednesday, May 19th, Forcepoint is hosting an event for DHS stakeholders in this conversation, a complimentary virtual conference, where industry experts from government, industry and Forcepoint discuss the Department of Homeland Security’s blueprint for zero trust and data protection strategy. With so much at stake, aligning with the right zero trust strategy for data protection is crucial.
WHY A RISK-ADAPTIVE APPROACH IS CRITICAL FOR DHS – FIRESIDE CHAT:
Join thought leaders and technical experts in government solutions and Forcepoint’s experts as they dive into the critical data protection issues facing the DHS today. Actionable insights for how to remain ahead of adversaries and risks.
BLUE PRINT INSIGHTS:
Cybersecurity expert and Forcepoint CTO, Petko Stoyanov, describes why a risk-adaptive approach to data protection and zero trust is crucial for the DHS. Based on supporting IT experience within the Intelligence Community and Department of Defense.
FUTURE INSIGHTS – CLOSING FIRESIDE CHAT
- Technical experts provide a high-level overview of how risk-adaptive data protection can work within DHS’ environments.
BEHAVIORAL SCIENCE INSIGHTS – FIRESIDE CHAT:
This event is an invite-only and intended for Department of Homeland Security employees only. Forcepoint reserves the right to refuse registrations for members of industry or other government agencies
- A look at the future impact of Zero Trust within Government Security with government and operational cybersecurity experts.
Register today via this link or the green button on the right.
Hosted By: Forcepoint, Global Governments & Critical Infrastructure (G2CI) and Thundercat Technology.
CPE CREDIT AVAILABLE: 1 CPE credit
For more information on the CPE credits being offered, our CPE sponsor (NASBA), and the submission process, please read our CPE information page.
CPE certification at the Forcepoint Virtual Conference: DHS’ Zero Trust, Risk-Adaptive Data Protection is being administered by Carahsoft Technology Corp. Carahsoft is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education of the National Registry of CPE Sponsors. State boards of accountancy have final authority in the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website.
This post was first first published on Forcepoint website by Petko Stoyanov. You can view it by clicking here