U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463736425
Publisher: Progressive Management Publication: June 5, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463736425
Publisher: Progressive Management
Publication: June 5, 2018
Imprint: Smashwords Edition
Language: English

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report has been professionally converted for accurate flowing-text e-book format reproduction.

As Federal agencies become increasingly reliant on technology solutions, cyberspace and its underlying infrastructure are essential tools for mission delivery. The government's digital infrastructure, however, is constantly under attacks from malicious actors whose capabilities are growing increasingly sophisticated. Recent breaches of sensitive government systems and the consequences of these breaches have made clear the need for us to reevaluate the Nation's approach to cybersecurity.
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties. This increased connectivity only enhances our organization's effectiveness and the Nation's security if CBP adopts tough cybersecurity measures. Given the significant potential impacts of a cyber breach, cybersecurity must be a shared responsibility that is a top priority for all CBP employees. Everyone has a part to play in protecting CBP networks, systems, and the traveler and trade data that has been entrusted to us. While we have recently pulled together to achieve great gains in this area, there is still much work to do. The CBP Cybersecurity Strategy is intended to advance CBP's cybersecurity posture amid continued growth in connectivity by engaging all of CBP in achieving three strategic goals: * Protect the CBP mission by integrating cybersecurity into the organization; * Building a strong cybersecurity foundation and drive toward sustainable mission integrity; and * Develop and support a skilled workforce.

Executive Summary * Introduction * Cybersecurity Strategic Goals * Protect the CBP Mission and People by Integrating Cybersecurity into the Organization * Build a Strong Cybersecurity Foundation and Drive toward Sustainable Mission Integrity * Develop and Support a Skilled Workforce * Path Forward

More books from Progressive Management

Cover of the book Al Qaida's (Mis)adventures in the Horn of Africa - Kenya, Eritrea, Sudan, Ethiopia, Somalia, Djibouti, Al-Ittihad al-Islami (AIAI), Eritrean Islamic Jihad (EJIM) by Progressive Management
Cover of the book Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multiservice Procedures for the Theater Air-Ground System TAGS Field Manual - FM 100-103-2 (Value-Added Professional Format Series) by Progressive Management
Cover of the book America's Space Shuttle: EVA Contingency Operations NASA Astronaut Training Manual (CONT OPS 2102) by Progressive Management
Cover of the book 2011 Weapon Systems of the U.S. Army: Comprehensive Review of Major Army Acquisition Programs with Program Status, Contractor, Teaming Arrangements, and Critical Interdependencies by Progressive Management
Cover of the book NIOSH Nanotechnology Safety: Safe Nanotechnology in the Workplace, Workers Exposed to Engineered Nanoparticles, Health and Safety Concerns Research by Progressive Management
Cover of the book The 2005 Iraqi Sunni Awakening: The Role of the Desert Protectors Program - Iraq War and Operation Iraqi Freedom, Anbar, Al Sahawa, Albu-Nimr Tribe in Hit, al-Qaeda Terrorism, Al Qaim, Sheikh Sattar by Progressive Management
Cover of the book The Fighting Colonel: Ranald S. Mackenzie's Leadership on the Texas Frontier - Conflicts Between White Settlers and Comanche Indians at Battles of Blanco Canyon, McClellan's Creek, Palo Duro by Progressive Management
Cover of the book Air Force Doctrine Document 3-1, Air Warfare: Fundamentals, Missions, Planning, Training, Exercises, Asymmetric Force, Aerospace Power by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Aircraft Recovery Operations - Field Manual 3-04.513 - Personnel, Downed Aircraft, UAS, Accidents (Professional Format Series) by Progressive Management
Cover of the book Operation Fast and Furious: Senate Report on the ATF Gunwalking Policy on the Southwest Border, Mexican Gun Trafficking, Death of U.S. Border Patrol Agent Brian Terry, Mexico Drug Violence by Progressive Management
Cover of the book New Terrorism in France: Impact of Transnational Salafist Muslim Jihad Recruiting Wayward Youth With a Narrative of Renewed Identity, Social Media Radicalization and Lone Wolf Islamist Attacks by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: First Aid Field Manual - FM 4-25.11, FM 21-11 (Value-Added Professional Format Series) by Progressive Management
Cover of the book General William C. Westmoreland: Symbol of America to War, 1964-1968, Symbol of War to America, 1982-1985 - A Study of Three News Magazines, Vietnam War, CBS Libel Trial by Progressive Management
Cover of the book Phases of Violent Extremism: Targeting the Evolution of Al-Shabaab - Terrorism in Somalia and the Horn of Africa, Islamic Extremism, Kidnap for Ransom, Non-State Actors, Deterrence and Culture by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy