🗞️ In CyberScoop: "[T]he years of work to build up federal collaboration with industry are paying off, from the Joint Cyber Defense Collaborative to the National Risk Management Center — the 'proto' version of the JCDC, [Chris Krebs] said — to the National Security Agency’s Cybersecurity Collaboration Center. "'We’re starting to see that these things work with the resources and time into it, but it’s generating results and there’s no better evidence of the results, I think, than when Russia invaded Ukraine, and the ‘Shields Up’ campaign and the breadth to which that was able to change behavior in industry,' said Krebs, now chief intelligence and public policy officer at SentinelOne." To learn more, read the full article by Tim Starks: https://s1.ai/CS-Collab
SentinelOne’s Post
More Relevant Posts
-
Cybersecurity is more critical than ever for defense organizations! Discover how adopting a Zero Trust approach can help mitigate risks and safeguard sensitive data in this article from ADS Advance. Learn the steps to building a more secure future:
Countering defence cyber risks via zero trust
adsadvance.co.uk
To view or add a comment, sign in
-
From my outside looking in perspective, 5 areas will receive priority attention with CISA under the new Administration as we begin 2025. They include: 1) Protecting U.S. critical infrastructure, 2) Prioritizing Interagency Government Cooperation and Public-Private Cooperation, 3) Building on Government Cyber Risk Management Strategies, 4) Addressing The Emerging Technology Landscape, and 5) Ensuring The Cybersecurity of Space Systems
5 Cybersecurity Priorities for The Trump Administration
social-www.forbes.com
To view or add a comment, sign in
-
CIO POV: What Makes a Good Neighbor in a Bad Cyber Neighborhood It’s discouraging to try to be a good neighbor in a bad neighborhood.” –William Castle If you are a CIO or CISO, We recommend that you take ownership as a good neighbor and actively support your industry peers and organizations like NIST and NCSC, which develop guidelines for securing a nation’s critical infrastructure and any organization of any size across any sector. I recommend you consider the following as the duties of a good neighbor to slowly and effectively increase the good in the bad neighborhood. https://lnkd.in/d4XYtWNW
CIO POV: What Makes a Good Neighbor in a Bad Cyber Neighborhood
cyberark.com
To view or add a comment, sign in
-
Cybersecurity is more critical than ever for defense organizations! Discover how adopting a Zero Trust approach can help mitigate risks and safeguard sensitive data in this article from ADS Advance. Learn the steps to building a more secure future:
Countering defence cyber risks via zero trust
adsadvance.co.uk
To view or add a comment, sign in
-
Cybersecurity is more critical than ever for defense organizations! Discover how adopting a Zero Trust approach can help mitigate risks and safeguard sensitive data in this article from ADS Advance. Learn the steps to building a more secure future:
Countering defence cyber risks via zero trust
adsadvance.co.uk
To view or add a comment, sign in
-
Intelligence agency CIOs believe collaboration and a zero-trust security model are key to fortifying cybersecurity defenses. Read more: https://lnkd.in/efgNMvM5 National Security Agency | Defense Intelligence Agency | National Geospatial-Intelligence Agency
Intel CIOs Tout Zero Trust Efforts for Cyber Defenses
https://govciomedia.com
To view or add a comment, sign in
-
100% agree with Frank Cilluffo at Auburn University McCrary Institute "Ultimately, the success of our nation’s cybersecurity efforts will depend on our ability to operationalize a coordinated approach, working together to implement the best practices and relentlessly focus on securing the digital infrastructure and protecting the American people. With the 2024 Posture Report as our guide, we have a roadmap to bring a measure of science to the art of cybersecurity policymaking and transition from reacting to cyber threats to proactively shaping a more defensible digital ecosystem." https://lnkd.in/erWrS8Qz
Towards a Data-Driven Cyber Strategy: Unpacking the National Cyber Director's Posture Report
https://www.thecipherbrief.com
To view or add a comment, sign in
-
From Breaking Defense (by Bill Greenwalt): “After much delay, the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) 2.0 is reportedly on track to be released in the first quarter of next year — just in time to preempt a potential new administration from reviewing it. However, it’s worth considering if CMMC 2.0 even needs to see the light of day.” #govcon #defense #cyber #cmmc #cmmc2
DoD and Congress should walk away from CMMC - Breaking Defense
breakingdefense.com
To view or add a comment, sign in
-
In today’s fast-changing cyber threat landscape, national security is of utmost importance. Dive into this insightful article by Alvaro Vitta, Tomas Beerthuis and Hila Yehuda, which explores three crucial areas for advancing government cyber defense. https://lnkd.in/eYfKX9YQ
Defending Nations: 3 Strategic Shifts to Evolve Government Cyber Defense
darkreading.com
To view or add a comment, sign in
-
"It calls upon the director of CISA or the director of CISA’s designee to serve as the chairperson of the task force, while the director of the FBI or such director’s designee shall serve as the vice chairperson of the task force." https://lnkd.in/dfsPd8Wg #CyberThreats #CyberSecurity #NationalSecurity #CCP #CyberResilience #USHomelandSecurity #CyberDefense #PolicyUpdate #TechRegulation #industrialcyber #icssecurity #ics
Republican Homeland Security Committee bill set to combat CCP cyber threats, boost cyber resilience
https://industrialcyber.co
To view or add a comment, sign in
253,297 followers