U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463736425
Publisher: Progressive Management Publication: June 5, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463736425
Publisher: Progressive Management
Publication: June 5, 2018
Imprint: Smashwords Edition
Language: English

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

More books from Progressive Management

Cover of the book Encyclopedia of NASA Lessons Learned (Part 1): Thousands of Aerospace Technology Engineering Reports, Problems, Accidents, Mishaps, Ideas and Solutions - Space Shuttle, Spacecraft, Rockets, Aircraft by Progressive Management
Cover of the book The Report of the Presidential Commission on the Space Shuttle Challenger Accident: The Tragedy of Mission 51-L in 1986 - Volume Two, Appendix E, F, G, H, I, J, and K, including Feynman Analysis by Progressive Management
Cover of the book Countermobilization: Unconventional Social Warfare - Combating Violent Extremism in Iraq and Al-qaida, Mexico and Zapatistas, Israel and Hamas PLO, Counter-narrative and Framing Process by Progressive Management
Cover of the book Return of the Bear? Russia's Ties with Former Soviet Allies in Latin America: Nicaragua, Cuba, Castro, Ortega, Counter-narcotics, Arms Transfers, Putin, Cuban Missile Crisis, Naval Deployments, Bases by Progressive Management
Cover of the book Transitions from Violence to Politics: Conditions for the Politicization of Violent Non-State Actors - Hizbollah, Irish Republican Army (IRA), Muslim Brotherhood, Partiya Karkeren Kurdistane by Progressive Management
Cover of the book Combating Daesh: A Socially Unconventional Strategy - Alternative Perspective on the Islamic State, ISIS, ISIL, Unconventional Warfare, Human Domain Mapping, Iraqi Baath Party and Republican Guard by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Urethral Cancer (Cancer of the Urethra) - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Improving Cybersecurity in the Health Care Industry: Report of the Health Care Industry Cybersecurity Task Force - Risks to Medical Devices and IT Systems, Working in the Open Culture of Health Care by Progressive Management
Cover of the book Autonomy of the Air Arm (The Question of Autonomy for the United States Air Arm, 1907-1945) - Impact of the World War I Years, Army Air Corps Creation, GHQ Air Force, World War II by Progressive Management
Cover of the book The Greene Papers: USMC Commandant General Wallace M. Greene Jr. and the Escalation of the Vietnam War, January 1964 - March 1965 - Marine Corps Documents through the Landing at Da Nang by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Mountain Operations Field Manual - FM 3-97.6, FM 90-6 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Resurgent Russia in 2030: Challenge for the USAF - Alternate Russian Futures, Political, Economic, and Military Background, Rising Power, Friend or Foe, Implications for the American Military by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Food Deterioration - Detection, Major Causes, Meat, Seafood, Dairy Products, Eggs, Milk, Fruits and Vegetables, Health Hazards by Progressive Management
Cover of the book The Military Strategies of Spruance and Halsey: World War II Battle of Midway, Battle for Leyte Gulf, Philippines, Sibuyan Sea, Surigao Strait, Cape Engano, Samar, Military Strategy Comparisons by Progressive Management
Cover of the book Interagency Standards for Fire and Fire Aviation Operations: Federal Wildland Fire Management Policy, Safety, Risk Management, Chemicals and Delivery Systems, Firefighting Training and Equipment by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy