People Plus Technology: Building a Resilient Federal Cyber Workforce

Filling cyber jobs in Federal agencies is complicated – it requires competing with industry salaries, retaining existing talent and navigating the Federal hiring process. It’s a far-reaching challenge that affects every agency – the administration knows that, the Office of Personnel Management knows that, and agency technology and human resources leaders know that. And federal C suite leaders realize how the government recruits, hires and retains people for cyber jobs has to change. In partnership with FNN, our Federal Cyber Workforce guide takes a look at what the government is doing to tackle this problem on a sweeping federal level and also on a more agency-specific level. We also get industry perspective on the technologies that affect cyber workforce resiliency. We hope it provides some guidance and help as your agency works to beef up its cybersecurity, both through investments in people and technology.

 

Carahsoft IIG FNN July Cyber Workforce Blog Embedded Image 20233 Key Rallying Points for a Resilient Cybersecurity Team

“Agencies are currently operating in a high-threat environment, but that doesn’t mean they can’t implement a reasonable amount of information assurance. It may not be perfect, but it doesn’t have to be. The idea is to make it so that adversaries have to work extremely hard to penetrate the infrastructure. The adversaries are good, but agencies can be better with a resilient cybersecurity team, said Mark Bowling, chief risk, security and information security officer for ExtraHop. The key to achieving this is to have a risk reduction perspective.”

Read more insights from Mark Bowling, Chief Risk, Security and Information Security Officer at ExtraHop.

 

Do not Wait for a Breach: Why to Adopt Proactive Approach to Cyber Resilience

“When most people talk about cyber resilience, they’re referring to post-breach recovery — the means, methods and speed with which an organization can get its systems and services back online after a cyber incident. But Felipe Fernandez, federal chief technology officer at Fortinet, views resiliency more holistically. His advice? Agencies need to take a proactive stance on cyber resilience and include not only recovery from breaches but also when their planning for non-malicious threats and other operational disruptions, including those associated with cloud-based services.”

Read more insights from Felipe Fernandez, Federal Chief Technology Officer at Fortinet.

 

Proactively Improve Digital Employee Experience Though Automation

“Digital modernization and the adoption of collaboration tools is supposed to make work easier, especially in a hybrid environment. Employees want the flexibility to be productive in whatever manner best suits them. Unresolved technology issues can impede productivity. In its latest survey of industry employees and IT professionals, Ivanti found that 49% of employees are frustrated with the tools they use and 26% are considering leaving their jobs because of that. Employee experience is a top priority in government right now, and employees are internal customers of an agency’s IT services. By improving their experience your agency can realize gains in productivity and retention.”

Read more insights from Mareike Fondufe, Product Marketing Director at Ivanti.

 

Download the full Expert Edition for more insights from these cyber workforce leaders and additional government interviews, historical perspectives and industry research.

Adapting with Evolving Higher Education Challenges

For many colleges and universities, the global pandemic served as a wake-up call for more innovative teaching models. They quickly discovered that remote learning is no longer an occasional tool for specific situations. Instead, a mix of in-person and online platforms has become an imperative to ensure digital equity and educational excellence. Even before the pandemic, researchers cited the importance of course design and the need for a pedagogical shift to ensure success in blended learning. Now, many believe that as faculty and students become more proficient with the technology and adapt to online education, outcomes will improve. Close collaboration between faculty and technology teams is also important as both groups adapt to new teaching models. To ensure clear communication, many institutions will need to invest in cameras, microphones and speaker systems, and many classes may benefit from a technology assistant who keeps track of the messages students post and resolves any technical issues. Incorporating such modern tools alongside institutions’ legacy solutions presents a diverse set of challenges. In the Campus Technology survey, staying within budget constraints (44%) was the top challenge cited by respondents, and it goes hand in hand with choosing the right products, services and solutions (41%). Technological challenges also include getting legacy and modern solutions to work together (36%), sharing data between legacy and modern systems (27%), and managing and securing a diverse IT ecosystem (25%). Learn how, by investing in further modernization, your institution can boost its ability to meet current demands while maintaining flexibility to respond to the unknown challenges ahead in Carahsoft’s Innovation in Education report.

 

Embracing the New Normal in Higher Education

“By allowing students of different backgrounds, perspectives, and ages to interact with one another, a hybrid or HyFlex approach enriches the classroom experience. That flexibility should be used as a recruitment tool: By offering a range of options for in-person and online learning, institutions can dramatically expand their reach nationally and even internationally. The success of the new normal in education hinges on being able to measure student engagement. In a face-to-face classroom, instructors can note whether students are making eye contact and how many of them are raising their hands or asking questions. At Class Technologies, we enable instructors to bring that same emphasis on student outcomes into an online format.”

Read more insights from Class Technology’s Senior Director of Advocacy and Community, Dr. Kim Oppelt.

 

Using Data Analytics to Enhance Student Services

“In addition to automation, artificial intelligence can transform the way colleges and universities provide services to their students. When higher education leaders understand the value and availability of AI, they can create a vision for its adoption. Then data analysts can use AI to accelerate the institution’s delivery of student services and improve its ability to predict outcomes early, enabling educators to address trouble spots early or invest in key initiatives. With AI, analysts can focus at the level of the entire student population, a certain demographic profile or the individual student. For example, AI can integrate with a campus learning system to identify students who may be at risk of dropping out. To be successful, AI must be part of an institution’s overall data management strategy, and the IT infrastructure should be built or updated to support that strategy.”

Read more insights from Cloudera’s Senior Solutions Engineer, Brian Hagan.

 

A Cybersecurity Mesh Speeds Digital Transformation

“Research firm Gartner defines a cybersecurity mesh as a “flexible, composable architecture that integrates widely distributed and disparate security services” — in other words, it enables institutions to leverage a suite of complementary tools. A mesh architecture creates efficiency and greater coverage across the digital surface, while enabling the IT team to understand what’s happening on its network and better prepare for the next cybersecurity event. This concept can also reduce the number of point security solutions and products. To make the business case for taking that approach, focus on demonstrating return on investment. A mesh architecture reduces costs because it consolidates tools and services while simplifying digital transitions. The mesh components will enable standardized training and raise the bar on knowledge transfer across the distributed IT environment.”

Read more insights from Fortinet’s Field CISO for Education, Bob Turner.

 

Why Student Experience Equals Student Success

IIE Campus Tech June Evolving Higher Ed Challenges Blog Embedded Image 2022“Student needs are so individualized that a single, one-size-fits-all approach to services is ineffective. Institutions need systems that can constantly learn from students as they’re navigating their experience on campus and then take student-specific action. Qualtrics’ experience management platform enables students to share feedback in a host of different ways and then crucially, pairs that data with internal systems to help institutions gain a holistic view of those students. Campus leaders can listen, understand and act through a platform that gathers information and converts it into real-time insights for decision-makers. In addition, the Qualtrics platform uses artificial intelligence to help schools understand what friction points exist in the student journey and then helps to automate actions, such as connecting students with the right resources, at scale. By giving the right people the right information at the right time, AI enables institutions to intervene at the moments that matter most. It also helps decision-makers measure the impact of those actions.”

Read more insights from Qualtrics’ Vice President Higher Education Strategy, Joshua Sine.

 

Pivoting to Continuous Modernization in Higher Education

“Continuous modernization involves making small changes and regularly deploying those changes under a methodology called continuous integration/continuous deployment (CI/CD). Users try out new features, and developers get immediate validation and testing throughout the entire process, which results in targeted and ongoing improvements. Another key element is automation. When rote tasks such as spinning up virtual machines, configuring networks or resolving users’ help tickets are automated, IT administrators can focus on more complex activities, such as improving processes or incorporating new technologies. In addition, containerization makes it easy to migrate applications and workloads back and forth from on-premises systems to the cloud as needed.”

Read more insights from Red Hat’s Chief Architect for Education and the North America Public Sector, Damien Eversmann.

 

Using the Power of Data to Support Collaboration

“Data analysis can help institutions gain a fuller understanding of their cybersecurity posture. For example, it can enable risk-based alerting, so staffers are not overwhelmed with security alerts that aren’t important. In addition, many institutions are merging their development, security and operations cycles in a methodology called DevSecOps. That collaborative approach ensures that security is an integral element of IT systems rather than an afterthought. Collaboration also results in deeper insights. When institutions can access and analyze student experience and outcomes, they have a much clearer picture of what they need to do from a strategy and planning perspective to enhance academic programs and student services.”

Read more insights from Splunk’s Strategic Advisor, Frank Myers, and Business Development Manager, Elizabeth Thompson.

 

A Data-Informed Approach to Recruiting and Retaining Faculty

“UT Austin has a strong commitment to nominating faculty for major awards across racial and gender lines. However, we wanted to pinpoint any gaps in the nomination process to make sure we retain talented faculty members by recognizing a diversity of research. We chose to partner with Tableau because the company offers a user-friendly process for developing self-service dashboards. In this case, an awards analysis dashboard helps us quickly identify under-awarded faculty in each department and drill down into race/ethnicity and gender information. As a result, we have achieved better equity in the awards nomination process and improved our faculty recruitment and retention efforts.”

Read more insights from the University of Texas at Austin’s Chief Data Officer and Executive Director of Institutional Reporting, Research and Information Systems, Shiva Jaganathan.

 

Creating a Single Source of Data Truth

“The ability to make those kinds of informed decisions hinges on robust data sharing. Unfortunately, many institutions still lack consistency in data access and management. And when data exists in silos, there is no single source of truth. Breaking down silos to give end users the power to do their own research is crucial, and that culture change starts at the top. Leaders must drive the demand for universal access to data so that everyone can be confident in the data they’re using and the decisions they’re making. ­At Tableau, our mission is to help people see and understand data. We continually enhance our product to ensure that decision-makers at all levels have access to the data and insights ­they need.”

Read more insights from Tableau’s Regional Vice President of Education and Nonprofit Sales, Cassidy Macias, and Vice President of U.S. Education Enterprise Sales, Adam Ingram-Eiser.

 

Discovering the Endless Possibilities of Automation

“From recruitment through graduation and beyond, automation can play a crucial role in ensuring that students have the experience the college or university wants them to have. Automation can help students succeed, and after they graduate, automation can be used to stay in touch — for example, by congratulating them on a new job when their LinkedIn profile changes and encouraging them to give back to the university. In the past couple of years, a mental health crisis has arisen in higher education, and many students withdrew from institutions or struggled to keep up with their studies. Tackling the issue should be a top priority in higher education because the crisis will continue for at least a few more years as people become accustomed to going back to campuses and in-person learning. Automated services can help institutions check in with students to see how they’re doing and connect them with mental health resources if necessary.”

Read more insights from UiPath’s Global State, Local and Regional Government Industry Lead, Dan Horan.

 

A More Immersive Experience for Students and Staff

“Zoom was a market leader in higher education even before the pandemic because our tools are affordable and easy to use. We have built a unified communications platform on top of our popular videoconferencing technology and, for the past two years, have focused on creating a superior on-campus experience by integrating communication across all operating systems and expanding capabilities via cloud telephony with Zoom Phone. For example, among many amazing features, using the Zoom application on a smartphone gives users the ability to have Zoom Phone voicemail messages transcribed and sent to their e-mail. In addition, while most people are familiar with the chat function that’s enabled during a Zoom meeting, we have a separate, robust Zoom Chat collaboration tool built into our unified communications stack. It allows users to create communication channels for particular projects or teams and conduct one-on-one or group chats.”

Read more insights from Zoom’s Global Education Marketing Lead, Johann Zimmern.

 

Download the full Innovation in Education report for more insights from these IT modernization thought leaders and for additional industry research from Campus Technology.

Current Cybersecurity Trends: The Next Wave of Cybersecurity

The coronavirus pandemic escalated government adoption of technologies like artificial intelligence, cloud, and the internet of things, as entire workforces shifted to telework. But just as agencies have adopted modern tech at record speeds, so too have cyber adversaries – and the rapid adoption of new solutions may create exploitable blind spots and gaps in security. Perimeter-less cloud-based systems present unique cybersecurity challenges, including maintaining visibility into a complex mix of cloud and on-premises systems. Grappling with the new reality of cloud-based environments requires government agencies to explore new strategies and best practices – including adopting a zero trust mindset, monitoring employee cyber hygiene, and investing in cybersecurity tools capable of simplifying complex tasks. Read the latest insights from industry thought leaders in cybersecurity in Carahsoft’s Innovation in Government® report.

 

IIG FCW August 2020 Blog ImageHow Employees Can Boost Cybersecurity

“Security controls are even more important in a world of perimeterless IT environments and expanding cloud adoption. Agencies need to appropriately budget for cybersecurity and apply the basic hygiene of security patching and vulnerability assessment. Those steps can cover about 80% of basic threats, and the security team can focus its energy on more complex threats. Having a strong team is the foundation of those efforts, but it’s not easy to recruit private-sector cybersecurity professionals for government jobs. An alternative is to recruit from within. The government should consider creating programs to train IT team members to take on higher-level cybersecurity roles, which helps agencies build effective teams and helps employees progress on a career path. Whether they bring in new talent or train existing employees, agencies must offer competitive salaries and benefits to keep cybersecurity professionals satisfied and engaged.”

Read more insights from SolarWinds’s Vice President of Products and Application Management, Jim Hansen.

 

A Better Approach to Telework Security

“This large-scale shift to working from home introduces interesting challenges for government agencies. How do they secure a growing number of remote devices while keeping employees productive? How do they enforce least privilege while allowing end users to perform necessary tasks? How do agencies secure devices, access and systems when the network perimeter has been stretched to support large numbers of remote workers? Some IT leaders have committed to VPNs or remote desktop access, both of which can be difficult to secure and scale. Devices are still at risk when they’re not connected to the VPN or remote access technology because of vulnerabilities in the home network. For example, agencies can’t protect against a family member or housemate using an employee’s home computer. They may also not be able to enforce whether or not basic software, such as antivirus or OS, is up-to-date on a personal device. The situation fundamentally requires a shift to the cloud.”

Read more insights from BeyondTrust’s CTO and CISO, Morey J. Haber.

 

Rethinking Security in the Age of COVID-19

“Although agencies are focused on telework security, they also need to think about what’s over the next hill. They should be aware that sequestration is likely just around the corner. Given the mounting deficit due to the pandemic-related stimulus package, I believe flat will be the new up for agency budgets, and when IT allocations shrink, security is often deprioritized. Now is the time to find smart ways to spend money. Agencies should look for multifunctional solutions, such as software-defined networking, and choose options that are intrinsically secure. Fortunately, we are on the cusp of a revolution driven by the intersection between the platform-based approach to cybersecurity and increasingly mature artificial intelligence. That convergence will tip the balance from attacker to defender.”

Read more insights from Fortinet’s Public-Sector Field CISO, Jim Richberg.

 

Visibility and the Quest for Zero Trust

“For the foreseeable future, agencies will use a blend of on-premises data centers, virtual environments, and public and private clouds. To better manage and protect those resources, agencies must have maximum visibility into all their data, including data in transit and encrypted data. A unified solution that provides pervasive visibility and manages information from a single pane of glass is increasingly important. That visibility enhances the security tools agencies are already using to defend their networks and improves the way they detect, investigate and respond to cybersecurity threats. In addition, zero trust architecture has gained a lot of momentum in the federal government. However, although agencies report that 80% or more of their network traffic is encrypted, we have seen that only about 30% is actually inspected. It’s a significant blind spot that must be addressed. Without pervasive visibility into data in motion — whether it’s in a physical or cloud-based environment — agencies can’t implement a zero trust architecture.”

Read more insights from Gigamon’s Vice President of Public Sector, Dennis Reilly.

 

The Growing Need for Asset Management

“More people are acting in decentralized ways right now, but that decentralization is part of a larger trend. Multi-month strategic plans are becoming a thing of the past, and fewer IT purchases go through the CIO’s office. According to researchers, over half of IT spending is now done by line-of-business leaders, not by a central function such as a CIO. Therefore, agencies must have a simple, comprehensive process for gaining insight into technologies as they’re added to the network. Otherwise, more security gaps will invariably occur. Those gaps are exacerbated by the pandemic because agencies cannot easily add secure data center capacity to support large-scale telework. It’s much easier to use a government purchase card to address a pressing need for videoconferencing, for example. But even approved cloud products and services are not secure by default. They need to be continuously monitored.”

Read more insights from Expanse’s CTO and Co-Founder, Matt Kraning.

 

The Key to Securing Cloud Resources

“The recent surge in telework affects the vast majority of government employees, including IT teams. But it is a challenge to manage and secure servers and other infrastructure located inside agency data centers without being able to physically access those resources. Given the restrictions on sending employees into government offices, many agencies are accelerating their move to cloud-based infrastructures, which essentially transfers the responsibility for physically managing servers to the cloud platform providers. Moving to the cloud is a logical and essential step toward enabling remote IT employees to gain access to systems and data, but it also expands the systems an agency must manage and heightens the need to control access to them.”

Read more insights from Centrify’s Chief Strategy Officer, David McNeely.

 

Adopting a New Defensive Strategy

“Threat actors are shifting their tactics to take advantage of your now decentralized workforce, which means the nature of your enterprise defines your threat landscape. To use a sports analogy, two teams face off against each other on a football field. The offensive line’s actions are executed to make it to the defender’s end zone. The line between the two is clearly defined, and each opposing team adjusts its actions to take advantage of the other’s potential gaps. Two factors come into play: visibility into how the opposing team is lined up and what plays it usually executes in that situation. In cyber, this requires visibility into where your teammates are, what your gaps are, where the opposing force is and what plays it may execute to take advantage of those gaps.”

Read more insights from Infoblox’s Principal Security Architect, Chris Usserman.

 

Why AI Transforms Cybersecurity

“The focus of protection has long been moving to the endpoint, but now that move is more pronounced than ever. However, agencies can no longer rely on a network to gain visibility into those end-user devices and know whether they are protected and what resources users are accessing. All that insight now happens via the endpoint rather than the firewall. The distributed nature of the workforce makes it harder to control where devices are and sometimes even to provision them. Along with allowing remote work, agencies must also allow remote security. That means they need to be able to monitor all those endpoints via the cloud, and devices need to have embedded mechanisms that deliver real-time protection regardless of cloud connectivity.”

Read more insights from SentinelOne’s Co-Founder and CEO, Tomer Weingarten.

 

A Unified Approach to Visibility and Security

“In one recent example of the growing sophistication of adversaries, Trustwave conducted a threat hunt that led to the discovery of a new malware family dubbed GoldenSpy. The malware was found embedded in tax payment software required for conducting business operations in China. GoldenSpy essentially is a backdoor that allows adversaries to inject malware or spyware into the company’s network. Even if you uninstall the tax software, the backdoor remains. Countering such threats requires coordinating a complex mix of on-premises, hybrid and multi-cloud environments. Furthermore, although a cloud provider typically offers security tools for securing data on its platform, those tools often won’t work across other cloud environments or give agencies complete visibility.”

Read more insights from Trustwave Government Solutions’s President Bill Rucker.

 

How to Build Stronger Security Teams

“Based on the lessons we’ve learned during the coronavirus pandemic, government networks may permanently become virtual, remote environments. The old approaches often don’t scale well for remote users, so the focus must shift to credentials and how to protect them. As computing resources move to the cloud, the credential is what glues everything together. Network defenders need to be able to record each action associated with a credential and know whether that behavior is normal or abnormal. With agencies operating in a complex mix of cloud and on-premises environments, it can be difficult to understand what’s going on and, more important, what’s normal and what’s abnormal. Machine learning through modeling allows agencies to answer those questions more quickly, more efficiently and with a higher degree of confidence than humans can.”

Read more insights from Exabeam’s Chief Security Strategist, Steve Moore.

 

Ripple20: A Mission-Critical Risk

“Forescout worked with JSOF, which first uncovered Ripple20, to identify the devices and vendors impacted by these vulnerabilities. JSOF estimates that hundreds of millions of internet of things and operational technology (OT) devices are at risk, and they are as varied as printers, uninterruptible power supplies, medical infusion pumps and industrial control systems. In short, Ripple20 can disrupt mission-critical technology that security teams typically don’t spend much time managing and sometimes can’t manage because the embedded software is not accessible. Unfortunately, that means there is no single manufacturer with a practiced way to fix the software. Instead, the burden falls on security teams to understand and mitigate the risk.”

Read more insights from Forescout Technologies’ Director of Federal Civilian Agencies, Erik Floden.

Download the full Innovation in Government® report for more insights from these Government Cloud Security thought leaders and additional industry research from FCW.