Critical Care

Agencies face enormous obstacles in securing vital networks, but failure isn't an option.

It seems that every week we learn about another data breach of a government or commercial network. If you think you've come through these assaults unscathed, you're wrong. Even if you haven't seen your diplomatic cables posted on WikiLeaks or your Gmail account hasn't been hijacked (to your knowledge), even if your organization doesn't have contracts with Lockheed Martin or Booz Allen Hamilton or any of the countless other corporate behemoths whose networks have been hacked in recent months, you still pay a price. Cybercrime and cyber espionage undermine our economic strength and weaken our national security. Developments in technology have far outstripped our legal and regulatory levers for protecting data and government leaders are scrambling to fill the void.

To take a closer look at the evolving state of cybersecurity, Government Executive has produced this special issue of the magazine devoted to exploring the risks and opportunities associated with one of the most intractable challenges the federal government faces. As Nextgov's senior correspondent Aliya Sternstein writes in an introduction framing the challenge, "Cybersecurity has no international or public-private boundaries, and thus no easy regulatory, behavioral or technological fix." While the Obama administration and Congress work to craft better cyber laws, government leaders would do well to reconsider how they think about the threat. So say contributors P.W. Singer and Noah Shachtman in a provocative essay that takes policymakers to task for misapplying Cold War rhetoric to a threat more akin to piracy. James Andrew Lewis and Daniel Gallington, both cyber experts and former federal executives, offer clear-eyed assessments of the threat and government's potential role in mitigating it. Estonian President Toomas Hendrik Ilves also shares his insights. He learned a thing or two about cybersecurity after Estonia's government and banking websites came under sustained and coordinated assault in 2007. And finally, Brittany Ballenstedt describes how agencies are coping with the most critical challenge of all-finding, hiring and keeping people with essential computer security skills.

If all this leaves you looking for even more resources, please pull out your smartphone and snap a picture of the QR code on this page (you may first need to download one of the many free QR reader apps available). It will take you to a page on Nextgov, our digital publication focused on technology in government, where you can learn more about cybersecurity and watch video interviews with experts.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.