IT Risk & Compliance Federal

Size: px
Start display at page:

Download "IT Risk & Compliance Federal"

Transcription

1 Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014

2 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19, 2017 to July 09, 2017, 200 federal government decision makers (100 federal civilian and 100 DoD/military) participated in an online survey that averaged eight minutes in length. Half of respondents work at federal civilian or independent agencies (including federal judicial, legislative and intelligence agencies). The other half work for DoD or military branches. Department of Defense or Military service 52% Federal Civilian or Independent government agency 48% 0% 10% 20% 30% 40% 50% 60% Which of the following best describes your current employer?

3 RESPONDENT CLASSIFICATIONS 3 Organization Role A variety of job roles are represented in the sample, with the highest proportions in executive management/command, and IT/MIS/IRM. Executive Management/Command IT/MIS/IRM Program Management 16% 20% 22% Operations/Administration Engineering Security operations 6% 8% 12% Acquisition Finance and budget Purchasing/Contracting Other 2% 4% 5% 6% 0% 10% 20% 30% Which of the following best describes your role in your organization?

4 RESPONDENT CLASSIFICATIONS 4 Decision Making Involvement More than half of respondents work on a team that makes decisions, or evaluate or recommend contractors offering IT modernization solutions. More than a quarter make the final decision regarding contractors in this area. On a team that makes decisions regarding contractors offering IT modernization management solutions Evaluate or recommend contractors offering IT modernization solutions 55% 54% Develop technical requirements for contractors offering IT modernization solutions Manage or implement contractors IT modernization solutions 42% 45% Make the final decision regarding contractors offering IT modernization solutions 28% Other involvement regarding contractors offering IT modernization solutions 10% 0% 10% 20% 30% 40% 50% 60% Note: Multiple responses allowed How are you involved in your agency s selection and/or management of government contractors that provide IT solutions, services and support to the IT modernization of your agency? (select all that apply)

5 RESOURCE ALLOCATIONS 5 Maintaining Legacy Systems RESOURCE ALLOCATION Opinion is split over the level of manpower and budgetary resources used to maintain their legacy systems. Notably, civilian agencies are significantly more likely than their DoD/military counterparts to believe their agency is understaffed in this area. Half of respondents feel the right amount of staff is devoted to federal network security, but one third believe too few staff are assigned here twice the proportion that think too many staff are involved. In line with this, four in ten think funding for this area is insufficient. As with federal network security, the same proportion of respondents contends not enough staff and not enough budget are being allocated to the security of their agency's critical infrastructure. How much of your agency s resources are being allocated to maintaining legacy systems?

6 CHALLENGES 6 Where in the Lifecycle Do Agencies Face Challenges? Four in ten believe modernization execution and deployment is the stage where they face the greatest difficulty. At the same time, more than a quarter have issues getting started. At the very beginning assessing and developing a high-level roadmap 27% Modernization readiness developing technology and staffing plans 17% Modernization execution & deployment designing, building, testing and implementation 42% Post modernization support after a new system is implemented 11% None of these stages are difficult 2% 0% 10% 20% 30% 40% 50% At what stage of the IT modernization life cycle does your organization face the most difficulty?

7 IT MODERNIZATION EFFORTS 7 IT Modernization Effort Grades PROCESS FACTORS While on average, six in ten graded themselves C or below, no more than one in ten graded their agency an A across eight process-related IT modernization efforts. Thus, there is great room for improvement in this area. F (Poor/not at all achieved) D C B A (Excellent/consistently achieved) Portfolio/asset review and assessment/inventory 6% 14% 40% 30% 10% Leveraging data to drive decisions 6% 16% 37% 32% 9% Proficiency of workforce to attain goals 7% 13% 34% 38% 8% Engagement with industry partners 5% 16% 34% 36% 8% Information sharing and collaboration within the agency 8% 13% 36% 34% 8% Realistic estimate of the scope of work involved Alignment of IT management and governance Quantifying potential impact (ROI) 12% 8% 8% 18% 16% 20% 29% 34% 7% 35% 35% 6% 34% 32% 6% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% <=C 60% 59% 54% 55% 57% 59% 59% 62% Regardless of official scorecards, how do you personally grade your agency on the following efforts in its IT modernization journey?

8 IT MODERNIZATION EFFORTS 8 IT Modernization Effort Grades TECHNOLOGY FACTORS As assessed by respondents, the lowest grades are for leveraging cloud and streamlined systems development, where two-thirds respectively give those dimensions a grade of C or below. F (Poor/not at all achieved) D C B A (Excellent/consistently achieved) Data center consolidation efforts 5% 12% 29% 44% 10% <=C 46% Use of automated management and monitoring tools 4% 15% 36% 36% 10% 55% Implementation of shared services 6% 15% 38% 32% 10% 59% Streamlined systems development 10% 23% 32% 26% 10% 65% Leveraging cloud computing 10% 18% 38% 25% 9% 66% Use of agile methods 6% 21% 31% 36% 6% 58% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Regardless of official scorecards, how do you personally grade your agency on the following efforts in its IT modernization journey?

9 IT MODERNIZATION EFFORTS 9 IT Modernization Effort Grades TECHNOLOGY FACTORS (CONTINUED) Across all technology factors, on average, more than half graded themselves a C or below. Across the 13 technology factors, no more than 16 percent gave a grade of A. F (Poor/not at all achieved) D C B A (Excellent/consistently achieved) Improve cyber security 4% 12% 28% 40% 16% <=C 44% FISMA compliance 4% 6% 33% 44% 14% 43% Improve infrastructure security 4% 12% 30% 40% 13% 46% Overall adherence to NIST s Framework for 5% 11% 35% 36% 13% 51% FedRAMP compliance 4% 9% 38% 35% 13% 51% Critical infrastructure management 4% 16% 35% 33% 12% 55% Use of digital technologies 4% 11% 33% 42% 11% 48% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Regardless of official scorecards, how do you personally grade your agency on the following efforts in its IT modernization journey?

10 IT MODERNIZATION EFFORTS 10 IT Modernization Effort Grades Differences In three instances, defense agencies are significantly more likely than their civilian peers to grade their IT modernization efforts an A/B. These include critical infrastructure management, internal information sharing/collaboration, and streamlined systems development. Grades of As/Bs 60% 50% 54% Defense 51% Civilian 43% 40% 30% 35% 34% 29% 20% 10% 0% Critical infrastructure management Information sharing and collaboration within the agency among the stakeholders involved with the process Streamlined systems development = statistically significant difference Regardless of official scorecards, how do you personally grade your agency on the following efforts in its IT modernization journey?

11 PRIORITIES 11 IT Modernization Priorities Agencies top IT modernization priorities over the next 12 months are led by cybersecurity, well ahead of a second tier of mentions including application modernization, cloud computing, and data analytics. Cybersecurity 62% Application modernization Cloud computing 37% 36% Data analytics 32% Digital/mobile solutions Shared services Agile delivery methods Data center consolidation 24% 23% 20% 18% Other 2% 0% 10% 20% 30% 40% 50% 60% 70% Note: Multiple responses allowed What are your agency s top priorities in its journey toward IT modernization in the next 12 months? (select top three)

12 IT MODERNIZATION EFFORTS 12 Other Top Priorities for IT Modernization: Cloud Four in ten believe that embracing cloud is important and significantly higher than those consider cloud adoption not important Amongst all IT Modernization priorities, Cloud services adoption is facing unanticipated difficulties. This is almost twice the proportion indicating Cloud as a priority Agencies with active industry partner engagement have less unanticipated difficulties with cloud adoption by a margin of 2 to 1 Agencies Top Priorities -IT Modernization-Next 12 Months Factor Total Unanticipated difficulties associated with cloud services adoption Yes No Importance of embracing cloud solutions Very/ somewhat Not very/ not at all Cloud Computing 36% 64% 30% 43% 19% = statistically significant difference What are your agency s top priorities in its journey toward IT modernization in the next 12 months? (select top three)

13 CHALLENGES & IMPACT ON IT SECURITY CHALLENGES 13 IT Modernization Efforts Impact on IT Security Challenges Nearly six in ten respondents think their agency's IT modernization efforts have resulted in an increase in the IT security challenges they face this is more than twice the proportion anticipating a decrease. Notably, however, defense agencies are significantly more likely than civilian agencies to cite a decrease in IT security challenges. 59% Defense Civilian 32% 18% 25% 16% Decrease Increase Has had no effect nor change = statistically significant difference In your opinion, do you think your agency s IT modernization efforts have resulted in an increase or decrease in the IT security challenges your agency faces?

14 CHALLENGES & IMPACT ON IT SECURITY CHALLENGES 14 Reasons IT Security Challenges Have Decreased First, more than half of those citing a decrease in their agency's IT security challenges point to the replacement of both legacy equipment and software. They also cite the simplicity to be gained through standardization, a reason far more commonly mentioned by civilian agencies. Reasons Challenges Have Decreased Legacy software replaced with new software 56% Legacy equipment replaced with new Standardization simplifies administration Cloud services adoption 40% 56% 56% Defense Civilian 44% 78% Fewer configurations to manage and support 36% Reduced number of devices to support Reduced need and time for training 22% 26% Other 4% 0% 10% 20% 30% 40% 50% 60% Note: Multiple responses allowed = statistically significant difference [IF DECREASE IS SELECTED] What are the reasons you believe IT security challenges have decreased as a result of your agency s IT modernization efforts? (select all that apply)

15 BENEFITS & IMPACT ON IT SECURITY CHALLENGES 15 Reasons IT Security Challenges Have Increased More than half of those citing an increase in their agency's IT security challenges feel it difficult for their IT staff to support and complete all transitions. Issues related to increased compliance reporting, complex management tools, and learning new systems, are other top factors. Reasons Challenges Have Increased Difficult for IT staff to support and complete all transitions Increased compliance reporting Complex management tools Lack of familiarity with new systems Organizational changes have disrupted IT processes Unanticipated difficulties associated with cloud services Too much consolidation has occurred Other 5% 16% 42% 41% 41% 37% 33% 53% 0% 10% 20% 30% 40% 50% 60% Note: Multiple responses allowed [IF INCREASE IS SELECTED] What are the reasons you believe IT security challenges have increased as a result of your agency s IT modernization efforts? (select all that apply)

16 BENEFITS, IMPORTANT FACTORS, AND CONCERNS 16 Greatest Benefits of IT Modernization Respondents most commonly cited benefit of IT modernization for their agency is enhanced security, followed by operational efficiency, and helping to meet mission goals. Boosts operational efficiency Complies with mandates/regulations Eliminates duplicative processes Makes operations more agile Improves citizen/customer experience 26% 26% 24% 22% 20% 18% 18% 38% 35% 33% 0% 10% 20% 30% 40% Note: Multiple responses allowed Overall, what do you see as the greatest benefits of IT modernization for your agency? (select top three)

17 BENEFITS, IMPORTANT FACTORS, AND CONCERNS 17 Benefits of IT Modernization Differences Defense respondents are significantly more likely to feel IT modernization enhances the security of their agency, while their civilian peers are twice as likely to indicate it promotes innovation. By Agency Type 50% 46% Defense Civilian 40% 30% 30% 25% 20% 12% 10% 0% Enhances security Promotes innovation where otherwise there would be little = statistically significant difference Overall, what do you see as the greatest benefits of IT modernization for your agency? (select top three)

18 BENEFITS, IMPORTANT FACTORS, AND CONCERNS 18 Important Factors to IT Modernization Efforts The factors deemed very/somewhat important to agencies IT modernization efforts are led by having sufficient funds, aligning the project with the mission, having skilled technical staff, and leadership commitment. Other factors here and on the following slide are also widely important. Not at all important Not very important Somewhat important Very important Very/ Somewhat Important Leadership commitment 4% 6% 27% 64% 90% Sufficient funds/budget 4% 4% 30% 62% 92% Skilled technical staff 4% 4% 32% 60% 91% Aligning project with agency mission 3% 6% 36% 55% 91% Setting realistic goals and timelines 5% 6% 34% 54% 88% Strong project management 5% 8% 37% 50% 86% Stakeholder communication 4% 12% 42% 42% 84% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Overall, how important are the following factors to your agency s IT modernization efforts?

19 BENEFITS, IMPORTANT FACTORS, AND CONCERNS 19 Important Factors to IT Modernization Efforts (Cont.) Though less important relative to the other factors, three quarters of respondents nevertheless consider embracing cloud solutions to be very/somewhat important. Not at all important Not very important Somewhat important Very important Shared accountability across IT and non-it executives 7% 14% 38% 40% Very/ Somewhat Important 79% Agile implementation 5% 16% 48% 32% 79% Governance approach 4% 16% 52% 28% 80% Mandated deadlines 4% 20% 48% 28% 76% Embracing cloud solutions 6% 20% 47% 27% 74% Effective engagement with partners in industry 6% 16% 52% 26% 78% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Overall, how important are the following factors to your agency s IT modernization efforts?

20 IT MODERNIZATION SENTIMENT STATEMENTS 20 IT Modernization Journey: Coded Top Comments Six in ten of those agreeing IT modernization is a unique journey believe that the agencies themselves are unique. Those that disagree are more likely to feel that even if unique in some ways, agencies have some similarities and/or must collaborate IT Modernization Is a Unique Journey for Each Agency and Should Be Approached That Way Agree Agencies are unique/different 61% Unique, but also similarities Disagree 21% Unique but with common needs Depends on training, mission, etc. Stakeholder buy-in important Culture can drive requirements 8% 6% 6% 5% Agencies should collaborate Agencies unique/distinct Agencies should standardize 17% 17% 12% Consequences to not modernizing 3% Know agency culture 5% What are the reasons behind your answer? (open end) 0% 20% 40% 60% 80% N= [Agree N = 109, Disagree N = 42] Note: Multiple responses allowed. Includes all mentions 3% or higher. 0% 20% 40% 60% 80%

21 IT MODERNIZATION SENTIMENT STATEMENTS 21 IT Modernization Journey Selected Quotes AGREE: IT Modernization Is a Unique Journey for Each Agency and Should Be Approached That Way Every Each agency is different. Nothing is cookie cutter. Our agency has specific challenges and goals that are not the same in all agencies. We need a custom tailored solution and not an off the peg solution. While the bureaucracy is similar, each agency has to deal with its unique culture and resistance to change. Each is starting its journey from a unique place in terms of measured risk and risk appetite. agency's mission, stakeholders, customers, and data requirements are unique. Their IT modernization should use the most efficient and effective hardware/software that allows for scalability and usability, while being tailored to the specific needs/mission of the agency. What are the reasons behind your answer? (open end)

22 22 Top Key Takeaways from Research Survey Results 1. Agencies see greater security, operational efficiency and mission fulfilment as top benefits of IT modernization and it seems abundantly clear that there is buy-in to the idea of IT modernization. 2. Agencies are facing increased Cyber challenges and unanticipated difficulties with Cloud adoption 3. There is evidently a shortage both of personnel and funding to increase the security of federal networks and critical infrastructure; and especially among federal civilian agencies, the manpower to maintain legacy systems. Only 10-16% grade their agency an A! 4. An IT Modernization revolution is underway, and the president s budget, new IT Modernization Report and MGT act will empower agency leaders to take quick action to focus on modernization efforts, especially with High-Risk High Value Assets (HVAs)

23 23 Join the Modernization Revolution and learn more at UNISYS MODERNIZATION REVOLUTION SURVEY SUMMARY REPORT MARKET CONNECTIONS, INC

MOVING MISSION IT SERVICES TO THE CLOUD

MOVING MISSION IT SERVICES TO THE CLOUD MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights

More information

CYBERSECURITY RESILIENCE

CYBERSECURITY RESILIENCE CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,

More information

CLOSING IN FEDERAL ENDPOINT SECURITY

CLOSING IN FEDERAL ENDPOINT SECURITY CLOSING IN FEDERAL ENDPOINT SECURITY More than half of agency IT officials worry about cyberattacks involving endpoint devices as a means of accessing agency networks. Yet many aren t taking advantage

More information

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities

More information

HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI

HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI Federal agencies have made significant strides in adopting cloud technologies. But a new survey of government IT leaders

More information

Federal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011

Federal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011 Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case

More information

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin Advanced Technology Academic Research Council Federal CISO Summit Ms. Thérèse Firmin Acting Deputy DoD CIO Cyber Security Department of Defense 25 January 2018 2 Overview Secretary Mattis Priorities Cybersecurity

More information

5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments

5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments 5 Challenges to Government IT Modernization: In Brief Quick tips & facts about IT modernization across federal, state and local governments Executive Summary Information technology (IT) modernization can

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Governance for the Public Sector Cloud

Governance for the Public Sector Cloud Governance for the Public Sector Cloud Managing Cost and Ensuring Compliance Paving the Way to the Cloud Forecasting a potential 30% reduction in data infrastructure spend, the U.S. Government embarked

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

FROM TACTIC TO STRATEGY:

FROM TACTIC TO STRATEGY: FROM TACTIC TO STRATEGY: The CDW-G 2011 Cloud Computing Tracking Poll 2011 CDW Government LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix

More information

5 Steps to Government IT Modernization

5 Steps to Government IT Modernization 5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower

More information

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security Cyber Security in 2016 Timothy Brown Dell Fellow and CTO Dell Security 2016 The middle of a perfect storm Technology Driving Innovation Advanced Adversaries Limited Resources Dell Secureworks Underground

More information

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen

More information

Accelerating Cloud Adoption

Accelerating Cloud Adoption Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive

More information

IT Digital Readiness Index Joel Conover Senior Director, Technology Thought Leadership January 2016 Data Center Partner Connection

IT Digital Readiness Index Joel Conover Senior Director, Technology Thought Leadership January 2016 Data Center Partner Connection IT Digital Readiness Index Joel Conover Senior Director, Technology Thought Leadership January 2016 Data Center Partner Connection Each customer faces a fundamental decision: will technology simply enable,

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey CyberMaryland Conference 2017 Bob Andersen, Sr. Manager Federal Sales Engineering robert.andersen@solarwinds.com

More information

Helping the Military Integrate, Innovate and Secure Networks across the Enterprise

Helping the Military Integrate, Innovate and Secure Networks across the Enterprise JANUARY 2016 AGILE AND OPEN C4ISR SYSTEMS Helping the Military Integrate, Innovate and Secure Networks across the Enterprise The U.S. military is tasked with protecting our nation, putting the lives of

More information

Professional Services for Cloud Management Solutions

Professional Services for Cloud Management Solutions Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Todd Sander Vice President, Research e.republic Inc.

Todd Sander Vice President, Research e.republic Inc. Todd Sander Vice President, Research e.republic Inc. Tsander@erepublic.com Report Background Respondent Type Breakdown Received responses from 74 state elected and appointed officials and 29 staff members

More information

10 Considerations for a Cloud Procurement. March 2017

10 Considerations for a Cloud Procurement. March 2017 10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Disaster Unpreparedness June 3, 2013

Disaster Unpreparedness June 3, 2013 Disaster Unpreparedness June 3, 2013 Underwritten by: Introduction Government relies on data and information to deliver mission success. Data loss means more than files simply missing from a database it

More information

Better skilled workforce

Better skilled workforce Better skilled workforce for the New Style of Business HPE Education Services November 20, 2015 Education is the most powerful weapon which you can use to change the world Nelson Mandela The New Style

More information

IT Modernization In Brief

IT Modernization In Brief IT Modernization In Brief WHAT YOU NEED TO KNOW Quick tips & facts about IT modernization from GovLoop Executive Summary Today, IT modernization the continuous updating of IT and technology infrastructure

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

A Working Paper of the EastWest Institute Breakthrough Group. Increasing the Global Availability and Use of Secure ICT Products and Services

A Working Paper of the EastWest Institute Breakthrough Group. Increasing the Global Availability and Use of Secure ICT Products and Services A Working Paper of the EastWest Institute Breakthrough Group Increasing the Global Availability and Use of Secure ICT Products and Services August 5, 2015 The EastWest Institute (EWI) is leading a Global

More information

Why Enterprises Need to Optimize Their Data Centers

Why Enterprises Need to Optimize Their Data Centers White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals

More information

How Your Organization Can Drive Success in the Age of Digital Disruption

How Your Organization Can Drive Success in the Age of Digital Disruption How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Cloud First: Policy Not Aspiration. A techuk Paper April 2017

Cloud First: Policy Not Aspiration. A techuk Paper April 2017 Cloud First: Policy Not Aspiration A techuk Paper April 2017 2 Cloud First: Policy Not Aspiration Introduction As more organisations begin to use cloud computing as part of the evolution of their business

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018 Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new

More information

Up in the Air: The state of cloud adoption in local government in 2016

Up in the Air: The state of cloud adoption in local government in 2016 Up in the Air: The state of cloud adoption in local government in 2016 Introduction When a Cloud First policy was announced by the Government Digital Service in 2013, the expectation was that from that

More information

Optimisation drives digital transformation

Optimisation drives digital transformation January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

How Cisco IT Improved Development Processes with a New Operating Model

How Cisco IT Improved Development Processes with a New Operating Model How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement; Shaping the Future of IS and ICT in SNH: 2014-2019 SNH s IS/ICT Vision We will develop the ICT infrastructure to support the business needs of our customers. Our ICT infrastructure and IS/GIS solutions

More information

Federal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT?

Federal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT? CATEGORY MANAGEMENT IN THE Federal Government Each fiscal year the Federal Government is challenged to accomplish strategic goals while reducing spend and operating more efficiently. In 2014, the Federal

More information

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION Alan Stuart, Managing Director National Science Foundation s New Headquarters in Alexandria, Virginia 1. Introduction to the National

More information

The Role of Converged and Hyper-converged Infrastructure in IT Transformation

The Role of Converged and Hyper-converged Infrastructure in IT Transformation Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

IT Modernization in State Government Drivers, Challenges and Successes. Bo Reese State Chief Information Officer, Oklahoma NASCIO President

IT Modernization in State Government Drivers, Challenges and Successes. Bo Reese State Chief Information Officer, Oklahoma NASCIO President IT Modernization in State Government Drivers, Challenges and Successes Bo Reese State Chief Information Officer, Oklahoma NASCIO President Top 10: State CIO Priorities for 2018 1. Security 2. Cloud Services

More information

FISMA Cybersecurity Performance Metrics and Scoring

FISMA Cybersecurity Performance Metrics and Scoring DOT Cybersecurity Summit FISMA Cybersecurity Performance Metrics and Scoring Office of the Federal Chief Information Officer, OMB OMB Cyber and National Security Unit, OMBCyber@omb.eop.gov 2. Cybersecurity

More information

Data Governance. Mark Plessinger / Julie Evans December /7/2017

Data Governance. Mark Plessinger / Julie Evans December /7/2017 Data Governance Mark Plessinger / Julie Evans December 2017 12/7/2017 Agenda Introductions (15) Background (30) Definitions Fundamentals Roadmap (15) Break (15) Framework (60) Foundation Disciplines Engagements

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

Top Priority for Hybrid IT

Top Priority for Hybrid IT Make Your Enterprise Network a Top Priority for Hybrid IT Hybrid IT has become a vital element in enterprises digital transformation strategy. But putting in place a hybrid IT framework is one thing, and

More information

Information Systems Security Requirements for Federal GIS Initiatives

Information Systems Security Requirements for Federal GIS Initiatives Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018 Enterprise Risk Management (ERM) and Cybersecurity Na9onal Science Founda9on March 14, 2018 Agenda Guiding Principles for Implementing ERM at NSF (Based on COSO) NSF s ERM Framework ERM Cybersecurity Risk

More information

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION POSITION: CHIEF OPERATING OFFICER FUNCTION: Responsible for all aspects of the SLV POA day-to-day operations. In this capacity,

More information

Kentucky IT Consolidation

Kentucky IT Consolidation 2007 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Consolidation Commonwealth Office of Technology The Commonwealth of Kentucky is nearing completion of

More information

Building a Threat Intelligence Program

Building a Threat Intelligence Program WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351

More information

Your Challenge. Our Priority.

Your Challenge. Our Priority. Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software

More information

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets. REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January

More information

June 2017 intel.com schneider-electric.com

June 2017 intel.com schneider-electric.com DCIM Solution Deployment June 2017 intel.com schneider-electric.com DCIM Solution Deployment Introduction Current state of data center management Do you currently have a solution deployed? 20% 80% The

More information

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats SELLING YOUR ORGANIZATION ON APPLICATION SECURITY Navigating a new era of cyberthreats Selling Your Organization on Application Security 01 It's no secret that cyberattacks place organizations large and

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

Developing a Model for Cyber Security Maturity Assessment

Developing a Model for Cyber Security Maturity Assessment Developing a Model for Cyber Security Maturity Assessment Tariq Al-idrissi, Associate Vice President IT, Trent University Ian Thomson, Information Security Officer, Trent University June 20 th, 2018 (8:45am

More information

Proven Integration Strategies for Government

Proven Integration Strategies for Government Opening Slide Proven Integration Strategies for Government Larry Singer, Vice President, US State and Local Government and Education Sales Technology for better business outcomes 2007 Hewlett-Packard Development

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Six Sigma in the datacenter drives a zero-defects culture

Six Sigma in the datacenter drives a zero-defects culture Six Sigma in the datacenter drives a zero-defects culture Situation Like many IT organizations, Microsoft IT wants to keep its global infrastructure available at all times. Scope, scale, and an environment

More information

Discover the power to do more

Discover the power to do more Cover story Discover the power to do more By Jeff S. Johnson As the line between business and IT strategy vanishes, five transformational imperatives are changing the economics of success in the Virtual

More information

TDWI Data Governance Fundamentals: Managing Data as an Asset

TDWI Data Governance Fundamentals: Managing Data as an Asset TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY WHITEPAPER PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY CONTENTS Executive Summary........................................ 3 The Cybersecurity and Business Risk Survey..........................

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

COMPANY BROCHURE. About Us. Kinnectiv, LLC. Consulting. Security. Innovation. +1(888)

COMPANY BROCHURE. About Us. Kinnectiv, LLC. Consulting. Security. Innovation. +1(888) About Us Serving customers nationwide and abroad, we are an experienced IT Services provider helping a variety of clients maximize the value of their IT initiatives, streamline project management, and

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

IT TRENDS REPORT 2016:

IT TRENDS REPORT 2016: IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION NORTH AMERICA WHAT WE COVER IN THE REPORT IT TRENDS REPORT 2016: THE HYBRID IT EVOLUTION Introduction Key Findings Recommendations Full Survey Results INTRODUCTION

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

Information Security Continuous Monitoring (ISCM) Program Evaluation

Information Security Continuous Monitoring (ISCM) Program Evaluation Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda

More information

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker ArcGIS in the Cloud Andrew Sakowicz & Alec Walker Key Takeaways How to Identify Organizational Strategy & Priorities Esri s Cloud Offerings A Broad Spectrum Successfully Executing Your Strategy The Cloud

More information

CIOs Reveal Their Priorities and Successes in IT Transformation

CIOs Reveal Their Priorities and Successes in IT Transformation Sponsored content CIOs Reveal Their Priorities and Successes in IT Transformation Digital business success has become heavily dependent on IT modernization and automation. CIOs point to progress on several

More information

Operationalize Security To Secure Your Data Perimeter

Operationalize Security To Secure Your Data Perimeter Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.

More information

Cybersecurity Risk Management:

Cybersecurity Risk Management: Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Service Management. What an Acquisition Practitioner Needs to Know. Karen Gomez Defense Information Systems Agency Mission Support Division

Service Management. What an Acquisition Practitioner Needs to Know. Karen Gomez Defense Information Systems Agency Mission Support Division Service Management DAU Symposium April 4, 2017 What an Acquisition Practitioner Needs to Know Karen Gomez Defense Information Systems Agency Mission Support Division 1 Topics DESMF The DESMF Realized Service

More information

Conducted by Vanson Bourne Research

Conducted by Vanson Bourne Research Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA

More information

State of South Carolina Interim Security Assessment

State of South Carolina Interim Security Assessment State of South Carolina Interim Security Assessment Deloitte & Touche LLP Date: October 28, 2013 Our services were performed in accordance with the Statement on Standards for Consulting Services that is

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information