Solutions Spotlight
Upcoming Events
Related News
Rising expectations bring mounting challenges
The public’s exponentially rising expectation of easy online access — fueled by unprecedented levels of convenience and expediency from smartphones, tablets, and laptops — comes with a major downside: never-before-seen levels of exposure to cyber criminals.
Bridging the gap between delivering the services people expect and operating in a totally secure mode is challenging. The breadth and sensitivity of information held by state and local government organizations — frequently including financial, medical and even criminal records — represents a very prized target for would-be hackers.
Cyber attacks are becoming more pervasive all the time. Announcements of high-profile data breaches are an almost daily occurrence.
Keeping safe
Staying ahead is of paramount importance for everybody entrusted with protecting data. However, it has become clear that traditional protection measures, like firewalls, intrusion prevention systems (IPS) and anti-virus (AV) software are not doing enough to protect organizations from the new generation of continually more sophisticated threats.
Maricopa County chief information security officer (CISO), Michael Echols, commented, “It’s really important to understand the characteristics and effectiveness of the security measures that you have in place. We have a multi-tiered approach and implement the best identification technologies available, but we also supplement this with a predefined mitigation strategy so that we know exactly how to handle anything that requires immediate attention.”
The county uses FireEye solutions to provide signature-less, real-time protection of its online assets. FireEye is a premier member of NACo.
Sharing the knowledge
Cyber security is obviously not just an issue for the county’s CISO. Echols noted, “We put a lot of energy into educating the community; the challenges we face are the same ones they are going to be facing at home. We feel a responsibility to share the best practices that will help our citizens to be safe online. We try to present a realistic view of the threats, as well showing what steps can be taken to minimize the dangers.”
For Echols it all comes down to being prepared. He summarized, “It’s really a numbers game: I’ve got to be right every time but the attacker only has to be right just once. We have implemented the very best defenses but are equally well-prepared for the remote possibility of a breach.”
(Echols is the chief information security officer (CISO) for Maricopa County, Ariz.— the fourth largest county in the United States. Prior to his appointment, he was a security consultant to multiple Fortune 500 companies. He is a published author and a sought-after speaker at national events, presenting on a wide range of information security-related topics.)
Attachments
Related News
Congress Votes to End Longest Federal Government Shutdown in History
On November 12, the U.S. House of Representatives voted to pass a Continuing Resolution and funding package (CR) to end the shutdown of the federal government that began October 1.
Congress advances resolutions to overturn three Bureau of Land Management resource management plans
On October 8 and 9, the U.S. Congress passed resolutions under Congressional Review Act authority expressing disapproval of three Bureau of Land Management resource management plans covering public lands in Montana, Alaska and North Dakota. The resolutions repeal recently finalized resource management plans and revert the areas to prior land use plans.
U.S. Fish and Wildlife Service announces it will not develop a recovery plan for the gray wolf
On November 3, the U.S. Fish and Wildlife Service announced it would not develop a national recovery plan for the gray wolf, which is currently considered endangered under the Endangered Species Act in much of the contiguous United States. The Service’s assessment, which determines that a nationwide recovery plan is no longer necessary for gray wolves, is consistent with previous federal agency findings that the species no longer warrant endangered or threatened species protection.