U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463736425
Publisher: Progressive Management Publication: June 5, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463736425
Publisher: Progressive Management
Publication: June 5, 2018
Imprint: Smashwords Edition
Language: English

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

More books from Progressive Management

Cover of the book Political Warfare and Contentious Politics: Chilean Case Study under Kennedy, Johnson, Nixon, Social Movement, Italian Political Parties, Socialists, Communists, Polity Models, Direct and Indirect by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Pheochromocytoma and Paraganglioma - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 2016 Nuclear Matters Handbook: New Revised Edition, Authoritative Guide to American Atomic Weapons, History, Testing, Safety, Security, Delivery Systems, Physics and Bomb Designs, Terror Threats by Progressive Management
Cover of the book Guide to Field Marshall William J. Slim: The Great General of World War II, Pivotal Role of Air Mobility in the Burma Campaign, Theoretical Thinking and the Impact of Theory on Campaign Planning by Progressive Management
Cover of the book 21st Century Pocket Guide to Hydropower, Microhydropower and Small Systems, Incentives and Funding, Dams, Turbine Systems, Environmental Impact and Fish Passage, History, Research Projects by Progressive Management
Cover of the book Impact of Battalion and Smaller African-American Combat Units on Integration of the U.S. Army in the European Theater of Operations During World War II: Black Infantry Platoons and Patton's Panthers by Progressive Management
Cover of the book Science in Flux: NASA's Nuclear Program at Plum Brook Station, 1955 - 2005 (NASA SP-2006-4317) - Nuclear Rockets, NERVA, Atomic Airplanes, Aircraft Nuclear Propulsion by Progressive Management
Cover of the book Vulnerability of the United States Railroad System to Terrorist Attacks: Risks to Amtrak Passenger Trains, Tank Cars, Cyber Attacks, Historic Lac-Megantic Oil Train Derailment, Screening Measures by Progressive Management
Cover of the book Directors of Central Intelligence (DCI) as Leaders of the U.S. Intelligence Community, 1946-2005, Central Intelligence Agency (CIA) Report - Dulles, Helms, Colby, Bush, Casey, Webster, Gates, Tenet by Progressive Management
Cover of the book Iraq: Federal Research Study and Country Profile with Comprehensive Information, History, and Analysis - Politics, Economy, Military, Saddam Hussein by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Astronaut Oral Histories, Group 2, including Lovell, McDivitt, Mitchell, Schirra, Schmitt, Schweickart, Shepard, Stafford, and Worden by Progressive Management
Cover of the book Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE by Progressive Management
Cover of the book 2015 U.S. Intelligence Community Worldwide Threat Assessment: Clapper Testimony: Islamic State, ISIS, Cyber Threats, Russia, Iran, Terrorism, al-Qaida, North Korea, Syria, National Security Strategy by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force Intelligence - Force Protection (FP), Predictive Battlespace Awareness (PBA), Open Source Intelligence (OSINT), ISR, Contingency Unit by Progressive Management
Cover of the book Air Force Studies Compilation: Chevron Chronology, Weather, Hurricane Katrina, Psychological Operations, Aerial Combat History, Aircraft Combat Losses, UAVs in Combat, Airlift in Enduring Freedom by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy