U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463736425
Publisher: Progressive Management Publication: June 5, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463736425
Publisher: Progressive Management
Publication: June 5, 2018
Imprint: Smashwords Edition
Language: English

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

More books from Progressive Management

Cover of the book Battle on the Bookshelves: History, Desert Storm, and the United States Armed Forces - Defense Department Uses Various Versions of History to Shape Perceptions of Accomplishments, Influence Decisions by Progressive Management
Cover of the book 21st Century FEMA Study Course: National Incident Management System (NIMS) Resource Management (IS-703.a) - Scenarios, Complex Incidents, Planning, Readiness by Progressive Management
Cover of the book The Three Wars of Lt. Gen. George E. Stratemeyer: His Korean War Diary - Far East Air Forces Commander, Problems with Other Services, the Press, Contradictory and Conflicting Orders, Lack of Materiel by Progressive Management
Cover of the book Morocco in Perspective: Orientation Guide and Moroccan Cultural Orientation: Geography, History, Economy, Security, Casablanca, Marrakech, Tangier, Berber Kingdoms, Umayyads, King Mohammed VI by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Gestational Trophoblastic Tumors, Hydatidiform Mole, Choriocarcinoma, GTD, GTT, GTN, PSTT - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Creating Paths of Change: Under What Conditions Can Special Operations be the Supported Command? Irregular and Unconventional Warfare Command and Control Involving SOF Special Forces by Progressive Management
Cover of the book Harmon Memorial Lectures in Military History, 1959-1987: Patton, MacArthur, Eisenhower, Pershing, FDR as War Leader, Washington and Marshall, World War II, Korean War, Tsarist Russia, Napoleon by Progressive Management
Cover of the book Complete Guide to Baluchistan: Baluchi Cultural Orientation, Balochistan, Southwestern Province of Pakistan, Strategic Importance, Nationalism and Separatist Struggle, Baruchi and Brahui, Gwadar by Progressive Management
Cover of the book The Story of Davis-Monthan Air Force Base 1940: 1976, Strategic Air Command, B-29, B-50, U-2, A-10, Lucky Lady II, Tactical Air Command, F-4C Fighter, Tucson Arizona Community, Aircraft Storage by Progressive Management
Cover of the book Twenty-First-Century Strategy: An Introduction to Modern National Security Processes and Problems - Nuclear Strategy, Terrorism, WMD, Asymmetrical Warfare, Insurgency Warfare by Progressive Management
Cover of the book Air Force Doctrine Document 3-12, Cyberspace Operations: Malware, Network Defense, Definitions, Policy and Doctrine, U.S. National Cyberspace Policy, United States Strategic Command by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Gastrointestinal Stromal Tumors (GIST) - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Nuclear Navy: The U.S. Naval Nuclear Propulsion Program - Submarines, Aircraft Carriers, Shipyards, Support Facilities and Tenders, Training Program, History of First Nuclear Propulsion Plants by Progressive Management
Cover of the book Army Research Laboratory Technical Report: A Summary of Visual Gaze and Dwell Times for Army Pilots During Mission Simulations (ARL-TR-5900) Army Aviation Simulators by Progressive Management
Cover of the book Partners in Freedom: Contributions of the Langley Research Center to U. S. Military Aircraft of the 1990s - Harrier, C-17, F/A-18, A-10, F-111, A-6, EA-6B, F-14, X-29, C-130, F-16, F-22, F-15, B-2 by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy