drj logo
  • This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Young Professional Spotlight
    • Career Spotlight
    • Article Submission
    • Digital Edition
    • DRJ Annual Resource Directories
    • Article Archives
  • EVENTS
    • DRJ Fall 2022
    • Other Industry Events
    • Schedule & Archive
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • DRJ Academy
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Directory
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • FAQs Committee
      • Web Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

Federal Government Invests in Cybersecurity; Experts React

by Jon Seals | June 23, 2022 | | 0 comments

As we continue to advance and utilize our technology more, our dependence on the cloud grows alongside it. The same can be said for our government; the more our technology advances, the more confidential data is at risk of cyberattacks in the cloud. 

This is why the federal government is investing 95 million dollars to aid in the modernization of cybersecurity operations at three different agencies. The funds will be split between USDA.net, DHS Homeland Security Information Network, and efforts that will work to improve multi-factor authentication, government data encryption, and adversary and vulnerability detection that use cloud-native technology. 

USDA.net will be upgrading, which will take approximately two-thirds of the 95 million invested. The main change is that they will go from 17 previous networks to one and enhance their existing security measures. Not only will downsizing their networks significantly increase their security prowess, but it will also save them approximately $734 million in the long run. 

DHS Homeland Security Information Network will be getting $26.9 million of the money being invested. That will go towards developing a new ISP. The remaining funds will be funneled into the improvement of various multi-factor authentication applications, government data encryption, and adversary and vulnerability detection using cloud-native technology. 

With more and more valuable data being stored on the cloud, cybersecurity is not something we can fall behind on. However, as more is invested in keeping our cybersecurity and cloud-native technology up-to-date, we continue to make great strides in ensuring that the threat of cyberattacks is gradually reduced. 

Top security experts have shared their insights on why evolving technology to combat and protect against evolving cybersecurity attacks is imperative as we continue to evolve into a more technologically centered society. 

Gal Helemski, CTO and co-founder, PlainID 

“The government holds the most sensitive data out there, and in today’s world, you cannot put your trust in any static, perimeter-based security system. Every single data access needs to be assessed in real-time with specific context of who is accessing what data, from where and how. This will massively improve the cybersecurity capabilities of these three federal agencies. 

Everyone must realize, the key to defending an organization from future cyberattacks is protecting the data and the applications, by ensuring that even if a bad actor (which can be a federal employee sometimes) has gained access credentials, they don’t have automatic access to any or all data. To quote from the memorandum “Authorization, a critical aspect of zero trust architecture, is the process of granting an authenticated entity access to resources. Authentication helps ensure that the user accessing a system is who they claim to be; authorization determines what that user has permission to do.”

Let’s face it, zero-trust is the only way to secure a modern, decentralized enterprise, in which data and applications are accessed from anywhere by employees, customers and partners.”

Danny Lopez, CEO of Glasswall

“We applaud the GSA’s distribution of funds to upgrade government agencies’ outdated perimeter-based defenses and move toward a zero trust approach. Zero trust security sees the world differently. No one is trusted by default, regardless of whether they are inside or outside a network. In a world where data can be held amongst multiple cloud providers, it is crucial to strengthen all processes relating to access verification. Without a zero trust approach, organisations run the risk of attackers having a free reign across a network once they are inside. Zero-trust starts by taking a proactive rather than a reactionary approach to cybersecurity. You are already too late if you are responding to a threat. Consideration of Content Disarm and Reconstruction, which proactively examines, purifies, and rebuilds files as they enter the organization, is a smart first step. This way, every file is seen as a potential hazard, and dangers are proactively eliminated before they can cause any harm.”

Arti Raman (She/Her), CEO and Founder, Titaniam

“In the last 12 months, there have been a series of guidelines issued by the Federal Government and President that require agencies to dramatically lift their security posture in the face of growing cyber attacks. Agencies have been asked to close current vulnerabilities and implement new solutions that enforce Zero Trust and improve data encryption. 

As agencies have moved to conform, it has become clear that in many cases, they are severely limited by budget and are unable to explore anything beyond the very basic. The funds made available by the General Services Administration will play a critical role in supporting much-needed security initiatives.

It is my hope that the budget is utilized not just to catch up to the basics, but to leapfrog and adopt critical new technologies such as encryption-in-use that comprehensively implement Zero Trust Data Security and have the power to eliminate data-related impacts from cyber attacks.” 

Neil Jones, director of cybersecurity evangelism, Egnyte

“With the escalating volume of nation-based and supply-chain-induced cyberattacks, it’s clear that the approaches most government agencies use to address targeted cyberattacks on critical U.S. infrastructure just aren’t working. So, I’m excited to see that $100 million from the General Services Administration’s Technology Modernization fund will be invested to improve user experience, maintain site resilience and enable more effective remote access at three key U.S. Federal agencies. 

Since the global pandemic began, users all across the world have demanded more of federal and local government resources, particularly those that are provided online. To meet such expectations, agencies can no longer rely on decades-old networks and file-sharing systems that can’t keep up with expanding user volume. Rather, they must be able to spin new computing capacity quickly, utilize secure networks with modern capabilities and apply critical security patches immediately. This appropriation will boost the country’s cybersecurity efforts and jump-start the government’s growing response to cybersecurity threats. And, it will protect U.S. citizens’ health, well-being and food safety, essential outcomes that we can’t quantify.”

Aaron Sandeen, CEO and co-founder, Cyber Security Works 

“The federal government’s investments should help government agencies establish their security posture through proactive penetration testing and ongoing vulnerability management.  Enterprises must repair the vulnerabilities that threat groups and attackers exploit in order to prevent catastrophe.

To truly safeguard their organization from potential cyberattacks, leaders must enhance their cybersecurity visibility of known and unknowable assets, validate more frequently, and look for early warning capabilities as the world’s cybersecurity issues grow.”

Recent Posts

  • Download Your Planning Templates
  • They Called Me ‘The Queen of Doom’
  • Business Continuity as a Business Strategy
  • AlertMedia Improves Emergency Management with the Launch of Event Pages: Connecting People with Critical Information in Real-Time
  • Disaster Recovery Planning in a VM Operating Environment

Recent Comments

  • carybaron@yahoo.com on Contingency Planning Cycle
  • marifergerson0102 on Contingency Planning Cycle

Archives

  • December 2020 (1)
  • October 2020 (1)
  • August 2020 (1)
  • January 2020 (1)
  • November 2019 (9)
  • October 2019 (8)
  • September 2019 (8)
  • August 2019 (17)
  • July 2019 (77)
  • June 2019 (92)
  • May 2019 (128)
  • April 2019 (109)
  • March 2019 (80)
  • February 2019 (106)
  • January 2019 (102)
  • December 2018 (96)
  • November 2018 (131)
  • October 2018 (139)
  • September 2018 (81)
  • August 2018 (124)
  • July 2018 (113)
  • June 2018 (90)
  • May 2018 (142)
  • April 2018 (151)
  • March 2018 (124)
  • February 2018 (157)
  • January 2018 (140)
  • December 2017 (118)
  • November 2017 (158)
  • October 2017 (186)
  • September 2017 (139)
  • August 2017 (212)
  • July 2017 (179)
  • June 2017 (214)
  • May 2017 (230)
  • April 2017 (223)
  • March 2017 (159)
  • February 2017 (175)
  • January 2017 (112)
  • December 2016 (8)
  • October 2016 (12)
  • June 2016 (15)
  • May 2016 (4)
  • April 2016 (10)
  • January 2016 (10)
  • December 2015 (2)
  • October 2015 (12)
  • September 2015 (2)
  • June 2015 (15)
  • April 2015 (15)
  • March 2015 (6)
  • February 2015 (7)
  • January 2015 (6)
  • December 2014 (18)
  • November 2014 (19)
  • October 2014 (24)
  • September 2014 (11)
  • August 2014 (13)
  • July 2014 (7)
  • June 2014 (36)
  • May 2014 (19)
  • April 2014 (21)
  • March 2014 (90)
  • February 2014 (5)
  • January 2014 (26)
  • December 2013 (10)
  • November 2013 (25)
  • October 2013 (37)
  • September 2013 (27)
  • August 2013 (8)
  • July 2013 (8)
  • June 2013 (31)
  • May 2013 (17)
  • April 2013 (103)
  • March 2013 (82)
  • February 2013 (120)
  • January 2013 (212)
  • December 2012 (128)
  • November 2012 (92)
  • October 2012 (159)
  • September 2012 (112)
  • August 2012 (153)
  • July 2012 (106)
  • June 2012 (91)
  • May 2012 (35)
  • April 2012 (49)
  • March 2012 (14)
  • February 2012 (19)
  • January 2012 (44)
  • December 2011 (9)
  • November 2011 (21)
  • October 2011 (45)
  • September 2011 (13)
  • August 2011 (9)
  • July 2011 (47)
  • May 2011 (46)
  • April 2011 (10)
  • March 2011 (25)
  • February 2011 (1)
  • January 2011 (17)
  • December 2010 (8)
  • October 2010 (19)
  • September 2010 (1)
  • July 2010 (23)
  • June 2010 (1)
  • May 2010 (1)
  • April 2010 (21)
  • March 2010 (1)
  • February 2010 (1)
  • January 2010 (4)
  • December 2009 (20)
  • November 2009 (4)
  • October 2009 (17)
  • September 2009 (11)
  • August 2009 (2)
  • July 2009 (2)
  • June 2009 (79)
  • April 2009 (20)
  • March 2009 (1)
  • January 2009 (22)
  • November 2008 (1)
  • October 2008 (1)
  • July 2008 (4)
  • June 2008 (22)
  • April 2008 (25)
  • February 2008 (1)
  • January 2008 (16)
  • December 2007 (17)
  • November 2007 (662)
  • October 2007 (410)
  • September 2007 (1)
  • November 1999 (1)

ARTICLES & NEWS

  • Business Continuity
  • Disaster Recovery
  • Crisis Management & Communications
  • Risk Management
  • Article Archives
  • Industry News

THE JOURNAL

  • Digital Edition
  • Young Professionals
  • Career Spotlight
  • Advertising & Media Kit
  • Submit an Article

RESOURCES

  • White Papers
  • Rules & Regulations
  • FAQs
  • Glossary of Terms
  • Industry Groups
  • Business & Resource Directory
  • Business Resilience Decoded

EVENTS

  • Fall 2022
  • Spring 2022

WEBINARS

  • Watch Now
  • Upcoming

CONTACT

  • Article Submission
  • Media Kit
  • Contact Us

ABOUT DRJ

Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

LEARN MORE

TWITTER

Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

Follow us for daily updates @drjournal

Newsletter

The Journal, right in your inbox.

Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

Subscribe Now
Copyright 2022 Disater Recovery Journal
  • Terms of Use
  • Privacy Policy