State of Nevada Addresses Information Security Challenges through Security Community Approach

July 17, 2019

Information security programs in the public sector are required to overcome substantial, unique difficulties, in addition to addressing those same challenges faced by their counterparts in the private sector. Statewide public-sector information security programs must be broad enough to address controls sets from myriad regulatory requirements, properly and effectively secure a wide range of data types, support the business processes and work flows of dozens of agencies (each with their own mandates and requirements), and adapt to the changes in direction and priority that a regular election cycle may bring.

Spotlight

CACI Ltd

CACI offer an unrivalled range of marketing solutions and information systems to a wide range of industries across both private and public sectors. CACI Marketing Solutions CACI's marketing solutions are based on both an in-depth understanding of individual consumer behaviour, as well as expertise on how geographical locations (towns, shopping centres, individual stores) influence the way consumers buy products and services. CACI offers a combination of data, software and consultancy. Data products include a range of individual, household and postcode level consumer classifications, for example Acorn, as well as information on income, house prices, Internet usage and more. CACI IT Solutions CACI's IT solutions business provides systems integration, software applications and consultancy services to organisations from across the public and private sector. From data integration, web reporting and activity based costing to mobile working, telecom operational support systems, online transac

OTHER WHITEPAPERS
news image

C2 Password Security White Paper

whitePaper | November 24, 2022

In recent years, the necessity to create and maintain dozens or hundreds of online accounts with logins and passwords has become more and more prominent, especially with remote work on the rise and internet usage at an all-time high. Nothing is more secure than making sure that every one of your accounts that you create is using a unique or randomly generated password, but where do you keep track of all of these passwords, and how can you ensure that your password security is up to par?

Read More
news image

Building a Successful Cloud Infrastructure Security and Compliance Practice

whitePaper | December 28, 2022

Cloud security truly is a team sport that requires strong collaboration between security, IT and line of business teams. The dynamic nature of cloud is forcing information security teams to rethink how they operate and partner with other groups to address emerging security and compliance challenges their organizations face.

Read More
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

Adobe Primetime Advertising Security Overview

whitePaper | December 30, 2022

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Read More
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More

Spotlight

CACI Ltd

CACI offer an unrivalled range of marketing solutions and information systems to a wide range of industries across both private and public sectors. CACI Marketing Solutions CACI's marketing solutions are based on both an in-depth understanding of individual consumer behaviour, as well as expertise on how geographical locations (towns, shopping centres, individual stores) influence the way consumers buy products and services. CACI offers a combination of data, software and consultancy. Data products include a range of individual, household and postcode level consumer classifications, for example Acorn, as well as information on income, house prices, Internet usage and more. CACI IT Solutions CACI's IT solutions business provides systems integration, software applications and consultancy services to organisations from across the public and private sector. From data integration, web reporting and activity based costing to mobile working, telecom operational support systems, online transac

Events