U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463736425
Publisher: Progressive Management Publication: June 5, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463736425
Publisher: Progressive Management
Publication: June 5, 2018
Imprint: Smashwords Edition
Language: English

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

More books from Progressive Management

Cover of the book NASA's Asteroid Redirect Mission, Asteroid Initiative, Grand Challenge, Science, Deflection and Human Exploration Plans, Crew Systems, Solar Electric Propulsion, NEO Campaign by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: Volume II: The Joint Chiefs of Staff and National Policy 1945 -1947 - Palestine, Berlin Crisis, Carrier Cancellation, NATO, Soviet Atomic Bomb, H-Bomb by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Therapeutics V - Microbiology, Intestinal Parasites, Antiparasitic Agents, Antibiotics, Antifungals, Antihistamines, Antimalarial, Vitamins by Progressive Management
Cover of the book Army Research Laboratory Technical Report: A Summary of Visual Gaze and Dwell Times for Army Pilots During Mission Simulations (ARL-TR-5900) Army Aviation Simulators by Progressive Management
Cover of the book Expansion or Marginalization: How Effects-Based Organization Could Determine the Future of Air Force Space Command, Cyber Command, Further Consolidation for Effectiveness, Combat Support Mission by Progressive Management
Cover of the book Apollo and America's Moon Landing Program - Oral Histories of Managers, Engineers, and Workers (Set 4) - including Kohrs, Eugene Kranz, Seymour Liebergot, Robert McCall, Dale Myers, John O'Neill by Progressive Management
Cover of the book Culture, Identity and Information Technology in the 21st Century: Implications for U.S. National Security, the Future of English in Language Usage, Demographic Shifts by Progressive Management
Cover of the book Nuclear Matters: A Practical Guide to American Nuclear Weapons, History, Testing, Safety and Security, Future Plans, Delivery Systems, Basic Physics and Bomb Designs, Effects, Accident Response by Progressive Management
Cover of the book The Russian Navy: A Historic Transition - Official U.S. Navy Intelligence Report on New Developments Shaping Russia's Navy and Operations in the 21st Century, Review of Ships, Weapons, Leadership by Progressive Management
Cover of the book Turkmenistan in Perspective: Orientation Guide and Turkmen Cultural Orientation: Geography, History, Economy, Security, Customs, Rural and Urban Life, Ashgabat, Turkmenbashi, Atrek River, Soviet Era by Progressive Management
Cover of the book Counterinsurgency in Somalia: Lessons Learned from the African Union Mission in Somalia, 2007-2013 - Insurgents, Harakat al-Shabaab, Somali Piracy, Evolution of AMISOM, U.S. Role, Lessons Learned by Progressive Management
Cover of the book Low-Intensity Conflict in the Third World: Middle East, Soviets, Russia, Latin America, South Africa, Southeast Asia, United States Policy and Strategic Planning by Progressive Management
Cover of the book Essential Guide to Russian Hacking and Malicious Cyber Activity in the 2016 Presidential Election, Intelligence Agency Reports, Role of Putin, Russia Political Warfare Against America and the West by Progressive Management
Cover of the book 2016 National Network of Fusion Centers: Final Report July 2017 - Fusion Center Profiles and Full List, Partner Agency Data, Staff and Analysts, Governance Structure and Membership, Operational Costs by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multiservice Tactics, Techniques, and Procedures for Risk Management Field Manual - FM 3-100.12 (Value-Added Professional Format Series) by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy