Government agencies at all levels have plenty of data they must protect, not to mention quite a few regulatory mandates to which they must comply. However, for a lot of public entities, more complex challenges often arise. Information security leaders must grapple with seeking increases in funding, additional resources, and buy-in for initiatives from internal divisions and the legislators who usually approve budget hikes.
Click here for the feature Is FISMA working?
Click here for the feature Meeting today's mandates
Additionally, government security and risk teams have to classify and safeguard various levels of data — from confidential internal documents to tax-paying citizens' private details. More and more government agencies rely on the internet and various types of web forms to share and exchange information with their constituents, just like their private counterparts. Too, just like most corporate employees, internal and contracted workers in government use handheld devices, laptops and USB sticks to store and work on critical files. And let's not forget that it's common practice for both private and public entities to communicate about important business initiatives via email or instant messaging. But these efficiencies introduce a host of security problems.
So what must government security leaders be mindful of when it comes to protecting critical data, and what are some of the steps they can consider taking to make their jobs easier? We find out.
Click here for the feature Is FISMA working?
Click here for the feature Meeting today's mandates
Additionally, government security and risk teams have to classify and safeguard various levels of data — from confidential internal documents to tax-paying citizens' private details. More and more government agencies rely on the internet and various types of web forms to share and exchange information with their constituents, just like their private counterparts. Too, just like most corporate employees, internal and contracted workers in government use handheld devices, laptops and USB sticks to store and work on critical files. And let's not forget that it's common practice for both private and public entities to communicate about important business initiatives via email or instant messaging. But these efficiencies introduce a host of security problems.
So what must government security leaders be mindful of when it comes to protecting critical data, and what are some of the steps they can consider taking to make their jobs easier? We find out.