Federal organizations rely on increasingly complex IT supply chains to manage state-of-the-art tools and systems, leaving products and information vulnerable to a multitude of security risks. This issue brief explores the security challenges facing the federal IT supply chain and makes recommendations for organizations seeking to reduce such risks.
ALL INSIGHTS Report POSTS
State and local governments face a multitude of cybersecurity threats unique to their regional and municipal oversight. A new survey report conducted by GBC explores these threats and what agencies nationwide are taking to stop them.
State and local governments increasingly find themselves pitted against a multitude of cyber threats unique to their regional and municipal oversight.
With just 10 days left before Election Day, Hillary Clinton has cemented her lead over Donald Trump among federal employees, according to an independent Government Business Council / Government Executive poll released on October 28, 2016.
Federal leaders weigh in on the state of information security.
President Obama’s 2011 Executive Order launched a nationwide effort to curtail waste, fraud, and improper payments across federal, state, and local governments. To better understand how federal, state, and local government leaders assess their organization’s fraud management capabilities, GBC recently deployed a survey to 340 federal leaders.
As troubling as a cyber attack from the outside can be, government agencies are looking to double down on what is potentially an even greater risk to their information and security: the insider threat.
An exploration of the current analytics landscape in American healthcare.
Proper management of privileged accounts is critical to mission security. But a growing number of state and local agencies are discovering firsthand the challenges involved are not easy to surmount.
In order to engage in informed decision making, federal organizations must critically evaluate their data management and utilization framework in order to effectively leverage information as a key strategic asset.