Sign up for Updates!

A Holistic Approach to Cybersecurity Risk

Two women and one man sit in a dark room at a computer table with three monitors. Behind the monitors is a world map with markers protrudingCybersecurity is a core business process that involves the entire organization or agency. So, it should not be brushed off as an ā€œIT thing.ā€ A cybersecurity state coordinator for CISA explains how the continuity of government and operations depends on a collaborative approach.

Protecting Infrastructure – Cyber, Physical, and EMP Attacks

Power lines against a blue skyImagine 3,500 spiders, each with their own style, getting together to create a giant web. That’s how this author describes the U.S. power grid and the complexities related to protecting the nation’s critical infrastructure from cyber, physical, and electromagnetic pulse attacks.

Repeated Intelligence Failures – Not Connecting the Dots

Gathering intelligence about potential threats is a daunting task that many agencies perform. When agencies do not effectively share intelligence, they may miss connecting the dots necessary to create actionable plans to thwart attacks and save lives.

The [Evil] Empire Strikes Back: National Security Emergencies

Five soldiers load boxes of water into a U.S. Navy helicopter on a tarmacAfter the Cold War fears of the 1980s ended, attention shifted from nation-state threats to terrorism and large-scale natural hazards. However, a federal emergency planner says the return of these threats should prompt a review of the national security emergencies concept to ensure communities are prepared to address them.

Needed: More Imagination for Countering Domestic Risks

From ā€œLord of the Fliesā€ to the terrorist attacks of 9/11, significant consequences have been blamed on failures of imagination. Avoid repeating past mistakes and increasing risk through innovation, new technologies, and forward-thinking.
Translate Ā»