State CIOs agenda targets cybersecurity

KENNETH CORBIN | April 26, 2016

article image
The association representing state CIOs has an ambitious policy agenda in the nation's capital this year, when members and their advocates will be appealing to Congress for help in securing critical infrastructure and for relief from a thicket of federal regulations.At the top of the list is cybersecurity, perhaps unsurprising given that members of the National Association of State CIOs (NASCIO) ranked that issue at the top of their own set of operational priorities late last year."Cybersecurity has been a big priority for NASCIO for many years," says Yejin Cooke, the trade group's director of government affairs. "So naturally, our federal advocacy, reflecting those priorities, is again [focused on] cybersecurity."NASCIO is appealing for greater federal resources to protect critical systems and data repositories overseen by the states, but is pragmatic enough to appeal for targeted funding or incentive programs that could advance specific goals in the cybersecurity arena.

Spotlight

BSides SATX

BSides was born in 2009 when a number of quality speakers were rejected from a mainstream conference, not due to lack of quality but rather lack of space and time. Our mission is to provide people with options by removing common conference barriers and by providing more options for speakers, topics, and events.

OTHER ARTICLES

EMAIL SECURITY CONCEPTS THAT NEED TO BE IN YOUR EMAIL INFOSEC POLICY

Article | June 16, 2021

Compliance requirements have become more complex because of the continual evolution of security threats and vulnerabilities. Many organizations fail to create an extensive security program to cover their challenges. Emails are one of the most susceptible channels for cyber-criminals to operate. This is why every organization must pay keen attention to email security policies in cybersecurity. Because emails are prone to cyberattacks, enterprises and individuals must take critical measures to secure their email accounts against unauthorized access. Malicious actors use phishing to trick recipients into sharing sensitive information, either by impersonating trusted contacts or legitimate business owners. Email is still one of the most vulnerable avenues for hackers and cyber crooks. Here are the critical email security concepts that need inclusion into your information security policy.

Read More

How Is Covid-19 Creating Data Breaches?

Article | March 30, 2020

Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC is not protected with updated security software nor the latest operating system patches. Kelcie’s home PC is faster than the old work laptop that she’s been issued to use during the pandemic. She decides to use a USB stick to transfer large files back and forth between her PCs to speed things up. After a few days, she does all her work on her home PC, using a “safe” virtual desktop app. But unbeknownst to her, there is a keylogger on her home PC.

Read More

How the IIoT can subdue cyber security challenges met by software adoption

Article | February 25, 2020

Matt Newton, senior portfolio marketing manager at AVEVA, discusses how IIoT can best cyber security challenges met through software adoption. According to Gartner’s 2019 Industrial IoT Platforms Magic Quadrant report, by 2023 30% of industrial enterprises will have full, on-premises deployments of IIoT platforms. IIoT platforms and software adoption is rapidly increasing – up 15% in 2019 – and this will undoubtedly continue to grow as we progress through the new decade. From enhancing operational performance to improved business processes, adopting new technology and software capabilities is vital for business success in today’s industrial sector. However, when it comes to adopting software and technology, integrating new systems with existing legacy systems in the industry can be a challenge.

Read More

A Closer Look at the Microsoft Exchange Server Cyberattacks

Article | May 13, 2021

We recently posted an article that highlighted the high-profile Microsoft Exchange hack that impacted hundreds of thousands of organizations across the globe. (This article offered some recommendations on how this could have been avoided as well as a special three-month offer to help any company who may have been affected.) Since this cyber attack, even more details are emerging. For example, the White House recently urged victims to quickly patch applications and systems and pushed for them to do it as quickly as possible. One senior administration official emphasized that the window to update these systems could be measured in hours, not even days.

Read More

Spotlight

BSides SATX

BSides was born in 2009 when a number of quality speakers were rejected from a mainstream conference, not due to lack of quality but rather lack of space and time. Our mission is to provide people with options by removing common conference barriers and by providing more options for speakers, topics, and events.

Events