The Cyber Future for Government Agencies

iStock/Just_Super

Presented by Peraton Peraton's logo

Cyberattacks are inevitable, and federal agencies are no longer waiting for the threat to come to them, instead seeking out more proactive ways to bolster defenses. Here’s how agencies can evolve to remain capable of serving their critical missions of consequence.

The largest vulnerability in today’s federal cyber landscape is also its most voracious defender: humans. Users are the weakest link in most defensive strategies. The challenge is only exacerbated by the increasing complexity of government IT and cyber environments, as well as new vulnerabilities introduced by workflow and infrastructure changes instigated by the COVID-19 pandemic.

“Today’s users, data and information processes are migrating off-premises, where adversaries operate unhindered by guards and gates,” said Lonnie Price, vice president of Cyber and Information Warfare at national security company Peraton. “Cyber actors have done years of homework to fully understand the security strengths and weaknesses of our cloud and mobile technology infrastructures and they scrutinize newly released versions of hardware and software for zero-day opportunities. We must employ tailored modernization strategies with appropriate built-in safety measures, before data has been put at risk, or we’re simply inviting the swimmers to dive in with the sharks.”

Price, a former U.S. State Department cyber and technology security leader, notes that in today’s cybersecurity landscape, cyber defenders, who must get it right every time, have a much more difficult job than adversaries, who need only get it right once.

Critical to rectifying this imbalance and correcting for inevitable human error is intelligent, agile and evolvable cyber technology that is designed to give the human element every advantage. For the many federal organizations that still have legacy infrastructure, this means carefully planning and integrating digital transformation across the enterprise.

A Holistic Approach to Cyber Defense

As lines between cyber offense and defense blur, how can government agencies ensure they’re approaching digital transformation in a way that defends against both today and tomorrow’s cyberthreats?

According to Price, any modernization process must encompass core cybersecurity best practices and capabilities, such as:

  • Security architecture that incorporates Zero Trust principles and Multifactor Authentication (MFA) for identity verification and access management
  • Advanced software encryption
  • Endpoint Detection and Response (EDR)
  • Continuous monitoring using Security Orchestration and Automated Response (SOAR) technology
  • Leveraging predictive data analytics with machine learning (ML) for the earliest possible attack tipoff
  • Other intelligence tools to help analysts operationalize cyber event data.

While cyber offense and the engagement of cyber adversaries is best handled by appropriate federal authorities, tactics like deceptive technology, continuous vulnerability testing, automated penetration testing, cyber threat hunting, and the use of blockchain technology can be effective components of an aggressively proactive strategy.

As cyberattacks become increasingly rampant and sophisticated, agencies must update security measures as soon as possible.

“Policies and tools should be updated to reflect the new reality that cyber compromise is no longer an if, but rather a when. To best prepare, leaders should ramp up cyber investigation and remediation capabilities,” said Price, noting that artificial intelligence and machine learning tools can help to improve remediation by operationalizing threat alerts and encouraging collaboration.

Collaborative Cybersecurity

Cooperation across all government sectors is a top priority when it comes to creating a more resilient environment. The Cybersecurity and Infrastructure Security Agency (CISA), for example, recently called for a Joint Collaborative Environment (JCE) intended to mount a “whole of government” national cyber defense so that a cyberattack on one U.S. entity is treated as an attack on all. This initiative facilitates public and private sectors to work in tandem to analyze cyber threats and data in a cloud computing environment. Unifying these fronts makes attacks more difficult and, in the event of a compromise, ensures recovery operations are better coordinated.

Private organizations like Peraton support agencies engaged in both defensive and offensive methods to help the U.S. take a holistic approach to cybersecurity and stay ahead of growing threats.

Peraton’s platform is designed to incorporate Zero Trust, MFA, EDR, advanced encryption, MDR, SOAR, predictive data analytics, blockchain, and other technologies that can help federal agencies shore up their defenses in preparation for inevitable cyberattacks. Combined with the company’s expertise, Peraton offers agencies the best practices and integration knowledge necessary to modernize successfully and securely.

“Peraton is uniquely positioned to help agencies through deep expertise in cross-platform and cross-domain information sharing to effectively and securely connect different levels of trust and organizational culture,” said Price. “We help bridge diverse, multi-sector, varying-trust level ecosystems to foster secure and candid collaboration among diverse stakeholders — DoD, service branches and combatant commands, government and law enforcement, the intelligence community, private sector and commercial and international partners.”

In today’s federal threat environment, everyone has a unique role to play and the only way to achieve full protection is through collaboration and cooperation. Peraton’s wide-ranging government customer base is a testament to the shared vision across federal channels to improve the nation's proactive cybersecurity programs.

“Command, control and utilization of all connected U.S. technology — satellites, cloud email, submarines, bombers, critical infrastructure systems, enterprise IT and digital transformation — are at risk if not appropriately protected,” said Price. “Fortunately, the intelligence community, military, civilian agencies and Congress are united in their desire to mandate and fund cybersecurity improvements — and here is the key to success — doing so in complete partnership with industry.”

 Learn more about how Peraton can help your agency optimize cybersecurity.

This content is made possible by our sponsor. The editorial staff was not involved in its preparation.

NEXT STORY: How Digital Twins Are Reshaping the Nature of Government Operations

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.