As cybersecurity threats against the federal government continue to evolve and become more complex, agencies are looking for more innovative cyber defenses. The 2021 Executive Orders around cybersecurity and the push for Zero Trust have helped government organizations develop new security strategies to contend with the evolving security landscape, but what more can they do to deter what seems to be a never-ending onslaught of attacks. Government Technology Insider recently talked with Justin Burwinkel, Vendor Account Manager for Dell EMC at Lyme Technology Solutions, to discuss current cybersecurity trends for public sector organizations.
Continue reading to learn the next cybersecurity steps your agency needs to take.
Government Technology Insider (GTI): What trends are you currently seeing in the security space?
Justin Burwinkel (JB): We’ve identified a few notable trends already in 2022. We are seeing a growing number of agencies working to follow the White House’s Executive Order (EO) revolving around SOAR. Security, Orchestration, Automation, and Response (SOAR) are becoming the primary focus within the EO blueprint for agencies to work towards. With this, we also see a shift in security principles, being that Zero Trust is at the forefront.
(GTI): What solutions are public sector organizations relying on to keep their environments safe?
(JB): I’m seeing a shift with the cloud, where agencies are moving back to be on-premises. With this change, we are seeing organizations update their security. Using security options that various cloud architectures offer helps agencies drive the protection of their data, while other software-defined infrastructure options allow for easily customizable security protocols to be implemented. Allowing for a mix of industry-standard solutions while also allowing for customizable options enable these agencies to bring security to the forefront in a multi-layered fashion.
(GTI): Are these solutions enough? If not, what other steps need to be taken to ensure security?
(JB): Each agency has different security requirements, although the framework and goals of SOAR and Zero Trust are constant. Though these items may be adequate now, they are only one piece of the puzzle. Agencies will need to evolve their protocols to adapt to the ever-changing threats. The ability to adapt and act quickly will build resiliency into their overall security posture. I’d also advise agencies to take a multi-layered approach. Doing so will only benefit the overall security posture, because if one layer fails other layers will still help protect from a deepening of the initial breach and any further compromise.
(GTI): How do you see the security landscape changing as we continue down a path of remote/hybrid work?
(JB): The expansion of remote and hybrid work models means there’s a need for more security. Security solutions and strategies must fully envelop the path from the edge to the cloud as data is everywhere and not just stored in the data center. With the plethora of devices that are connecting at the edge from a variety of networks, security should extend out as far out as possible upon initial connection. As more remote work and hybrid options become the norm, we’ll continue to see security be pushed out to protect the data as it travels along any gateway and any pathway present.
To learn more about cybersecurity solutions, click here.