SlideShare a Scribd company logo
1 of 11
Cyber capability brochure
Cybersecurity Today:
A fresh look at a changing
paradigm for government agencies
The cyber domain presents endless opportunities to
Federal agencies looking for new ways to deliver on their
mission and serve citizens, while reducing operational
risk. Government is investing in new and innovative
technologies that will empower our nation to achieve
more. Next-generation identification systems will
reduce terrorist and criminal activities by improving and
expanding biometric identification and criminal history
information services. “Smart” electric grids will make the
country more energy independent and increase the use
of renewable energies. Intelligent travel systems will make
air travel quicker and safer. Electronic medical records are
improving access to health care and reducing costs. These
investments require up-front planning and preemptive
cybersecurity practices to mitigate the inherit risks
associated with the advance persistent threat.
However, operating in the cyber domain is not without
increased risk. Our cybersecurity efforts are matched — if
not outpaced — by the sophistication on the part of
nimble opponents from other nations, cyber terrorists,
cyber criminal syndicates, malicious insiders, cyber
espionage — not to mention the inadvertent breach.
For better or worse, our cybersecurity efforts are
increasingly interconnected with agency mission
and programs, inextricably linking daily decisions on
performance, workforce management, and information
sharing with threat deterrence at every level of the
organization. By adopting a proactive, performance-
focused, and risk-intelligent approach to cyber initiatives,
leaders can help shape their organizations into more
proactive, agile, and resilient organizations to protect their
people, programs, and mission.
Cyber: The new normal
Cyber is not just a new domain, it is the new normal.
Agency leaders have a critical task ahead of them to
take a fresh look at their personnel, policies, processes,
and systems to synchronize their cyber initiatives and
empower collaboration across departments to protect
people, programs, and mission. To strengthen their cyber
efforts, today’s leaders are helping drive coordination
across functions, agencies, and the private sector toward
a shared cyber competence that enables the mission while
assigning accountability. Here are some actions agencies
should consider:
Treat data like a monetary asset. • Understand the
value of all your agency’s assets and protect what
matters most to the mission and preserve the public’s
trust.
Follow the flow of information• inside and outside of
your agency to identify vulnerabilities; strengthen every
link in the chain.
Do more with identity management.• Identity,
Credentialing, and Access Management (ICAM) offers
new opportunities to expand partnerships and add
services quickly and cost-efficiently.
Make cyber a performance goal.• Agencies that can
see what’s valuable to their people and programs will
shorten their learning cycle and drive lasting change.
Break security from its information technology (IT) •
silo. Get everyone — CFO, CHCO, CAO, CIO, CISO,
CTO, program leads, and others — at the table to drive
change in their department.
Adopt a risk-intelligent approach. • A 360-degree
view of your agency’s risks helps all departments make
better decisions, set priorities, manage investments, and
measure results.
Automate wherever possible.• Create a disciplined,
repeatable, control-based approach to reduce
redundancy and rework, and free up employees to
focus on managing the mission.
Cultivate workforce resiliency.• A cyber-sensitive
workplace incorporates role-based cyber training, sets
clear performance expectations, and helps protect
information security and personal safety.
Make room for a new kind of cyber leader. • Look
beyond functional and technology expertise when
vetting new leaders.
Move to a new cyber tempo. • More than just speed,
a cyber-savvy agency is agile — whether it is tackling
changing cyber threats or agency missions.
Cyber innovation. • Utilize the network data within
your own enterprise and fuse it with external cyber
intelligence to improve mission effectiveness.
Deloitte can help
Deloitte is committed to helping government achieve its
mission and performance goals in the cyber domain by
delivering a multidisciplinary perspective that cuts across
strategy, people, process, and technology. Deloitte's cyber
portfolio aligns with presidential mandates on transparency
and accountability to help clients in their efforts to develop
both a strong cyber foundation and a proactive cyber
posture.
“Over the past ten years, the frequency and
sophistication of intrusions into U.S. military
networks have increased exponentially. Every
day, U.S. military and civilian networks are
probed thousands of times and scanned
millions of times … Adversaries have acquired
thousands of files from U.S. networks and
from the networks of U.S. allies and industry
partners, including weapons blueprints,
operational plans, and surveillance data.”
— Journal of Foreign Affairs, September 2010
As used in this document, “Deloitte” means Deloitte & Touche
LLP,
which provides audit and enterprise services, Deloitte
Consulting LLP,
which provides strategy, operations, technology, systems,
outsourcing
and human capital consulting services, Deloitte Tax LLP, which
provides
tax services, and Deloitte Financial Advisory Services LLP,
which provides
financial advisory services. These entities areseparate
subsidiaries of
Deloitte LLP. Please see www.deloitte.com/us/about for a
detailed
description of the legal structure of Deloitte LLP and its
subsidiaries.
Security and privacy. • Assessment, remediation,
implementation, and integration solutions to help
agencies improve risk and compliance, security
and privacy, IT governance and technology control,
and address the myriad Federal technology-
related regulations and frameworks, including Risk
Management Framework (RMF), Federal Information
Security Management Act (FISMA), ICAM, Homeland
Security Presidential Directive 12 (HSPD-12), and more.
Forensics and Analytics. • Preventive behavioral
analytics-based investigative and forensic tools to
improve agency network operations, develop targeted
defensive strategies, and to secure important data.
Technology. • IT solutions for agency cyber issues,
including cyber situational awareness, cyber command
and control, secure enterprise architecture, and research
and development of new technology innovations.
IT transformation and standardization solutions for
organizations seeking not only to modernize, but also to
establish a resilient cyber operation profile.
Strategy and Operations.• Strategy and transformation
solutions for cyber organizations to stand up new
programs and get existing programs back on track.
Human capital management. • A full range of human
capital solutions to address agency cyber challenges,
including workforce-wide cyber training, culture change,
security workforce organization design, and capacity
building. Our cyber talent diagnostic tool examines an
agency’s existing structure for building cybersecurity
capabilities, identifies gaps across the current and
desired future state, and provides a prioritized road map
for enhancing existing or establishing new cyber talent
strategies and solutions.
Deloitte’s commitment to cyber:
Deloitte was recently selected by the Department •
of Homeland Security (DHS) and DHS Secretary
Janet Napolitano as the “Best Iconic and Overall
Structure” award winner for the 2010 National
Cybersecurity Awareness Challenge.
Three-year sponsor of the National Collegiate •
Cyber Defense Competition (NCCDC).
Corporate sponsor of the EastWest Institute (EWI)’s •
Worldwide Cybersecurity Initiative and a leading
sponsor of EWI’s Annual Worldwide Cybersecurity
Summit.
Deloitte has approximately 11,000 security and IT •
risk professionals.
Deloitte has 5,700 Federal practitioners and former •
government executives, including cyber leaders
and innovators widely recognized by government
and the private sector for their contributions to the
advancement of cyber thinking.
Forensics
and
analytics
Technology
Security
and
privacy
Human capital
management
Strategy
and
operations
Cyber
• Cyber research and development
• Cyber situational awareness
• Secure enterprise architecture
• Cyber command and control
technologies
• Cyber strategy
• Cyber transformation
• Incident response
• Malware analysis
• Code deconstruction
• Infrastructure assessments
• Financial intelligence
• Threat intelligence
• Secure workforce training and culture
• Security workforce organization
Design and capacity building
• IT risk management
• Operations, threat, and vulnerability
management
• Identity, credential, and access
management
• Application integrity
• Business continuity and resiliency
• Privacy and data protection
Copyright © 2010 Deloitte Development LLC. All rights
reserved.
Member of Deloitte Touche Tohmatsu Limited
Recognition from the experts
Top Ranked in Information Security and Risk •
Consulting in 2010 by Forrester
Rated a• Leader in IT Strategy and Planning consulting
in Kennedy Vanguard ITSP Provider Report
Rated • Leader in IT Strategy and Planning by Gartner
Rated • Top Firm in IT Organizational Redesign by
Forrester in 2009
Kennedy Information ranked • Deloitte #1 in Global
Talent Management Consulting (2009)
Top 20 Contractor• according to Washington
Technology’s Top Federal Contractors’ List for 2010
Deloitte’s cyber strategies in action
Deloitte’s specialized mix of private-sector perspective and
public-sector experience helps clients tackle their most
challenging cyber issues. Our multidisciplinary capability
and risk-intelligent approach has helped numerous
agencies with a wide range of missions. Recently, Deloitte
has helped Federal agencies in their efforts to:
Achieve 100% FISMA compliance for 80 plus •
information systems to reduce the overall level of effort
and cost of FISMA activities.
Develop and implement an identity and access •
management service to support the business and
application owners for over 400,000 users.
Retrain security personnel in cybersecurity issues, •
helping to protect the confidentiality, integrity, and
availability of $540 million worth of stakeholder
financial data.
Develop a FISMA-compliant IT security program, •
resulting in the certification and accreditation of 32
critical IT systems and becoming the model for other
agencies within the department.
Develop a single enterprise-wide IT cybersecurity •
environment and architecture for use domestically and
overseas, to help identify and control threats.
Establish an enterprise authorization capability to •
improve information sharing across organizations and
communities of interest on the global information grid.
Establish a privilege management system to help •
facilitate policy-based access control capable of
formulating and enforcing fine-grained and dynamic
access decisions.
Let’s talk
With a demonstrated track record of helping public and
private-sector organizations around the world achieve
cyber success, Deloitte has the people, insights, and
experience to help your organization achieve more. How
can Deloitte help you?
Helping clients achieve more
Deloitte continues to invest in resources and tools •
to help our clients accelerate cyber initiatives and
raise public awareness of the importance of cyber
risk issues. These investments include:
A global network of 53 security and forensics –
labs, including the Electronic Discovery
Solution
s Center, a 13,000 square foot facility
near Nashville, Tennessee, offering cross-
platform forensic analysis.
Our Center for Federal Innovation, housing –
production-ready services and solutions that
include current technologies and support
real-world deployments in cyber and next-
generation citizen services. The center includes
the Center for Cyber Innovation, dedicated
to the development of strategies for clients
grappling with the challenges of increasingly
vulnerable information networks.
Contact
JR Reagan
Principal, Deloitte & Touche LLP
[email protected]
+1 571 882 5870
Lt. Gen. Harry D. Raduege, Jr., USAF (Ret)
Chairman, Deloitte Center for Cyber Innovation
[email protected]
+1 571 882 7300
Amry Junaideen
Principal, Deloitte & Touche LLP
[email protected],
+1 202 220 2664

More Related Content

Similar to Cyber capability brochureCybersecurity Today A fresh l.docx

Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureAnn Treacy
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
5 Ways a Digital-Ready Network can Transform your Business
5 Ways a Digital-Ready Network can Transform your Business5 Ways a Digital-Ready Network can Transform your Business
5 Ways a Digital-Ready Network can Transform your BusinessNatalie Andrusyk
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportSamantha Wagner
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security GovernanceLeo de Sousa
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 

Similar to Cyber capability brochureCybersecurity Today A fresh l.docx (20)

CCA study group
CCA study groupCCA study group
CCA study group
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Untitled document.otd
Untitled document.otdUntitled document.otd
Untitled document.otd
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
5 Ways a Digital-Ready Network can Transform your Business
5 Ways a Digital-Ready Network can Transform your Business5 Ways a Digital-Ready Network can Transform your Business
5 Ways a Digital-Ready Network can Transform your Business
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security Governance
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 

More from faithxdunce63732

Assignment DetailsScenario You are member of a prisoner revie.docx
Assignment DetailsScenario You are member of a prisoner revie.docxAssignment DetailsScenario You are member of a prisoner revie.docx
Assignment DetailsScenario You are member of a prisoner revie.docxfaithxdunce63732
 
Assignment DetailsScenario You are an investigator for Child .docx
Assignment DetailsScenario You are an investigator for Child .docxAssignment DetailsScenario You are an investigator for Child .docx
Assignment DetailsScenario You are an investigator for Child .docxfaithxdunce63732
 
Assignment DetailsScenario You are a new patrol officer in a .docx
Assignment DetailsScenario You are a new patrol officer in a .docxAssignment DetailsScenario You are a new patrol officer in a .docx
Assignment DetailsScenario You are a new patrol officer in a .docxfaithxdunce63732
 
Assignment DetailsScenario Generally, we have considered sexual.docx
Assignment DetailsScenario Generally, we have considered sexual.docxAssignment DetailsScenario Generally, we have considered sexual.docx
Assignment DetailsScenario Generally, we have considered sexual.docxfaithxdunce63732
 
Assignment DetailsPower’s on, Power’s Off!How convenient is.docx
Assignment DetailsPower’s on, Power’s Off!How convenient is.docxAssignment DetailsPower’s on, Power’s Off!How convenient is.docx
Assignment DetailsPower’s on, Power’s Off!How convenient is.docxfaithxdunce63732
 
Assignment DetailsIn 1908, playwright Israel Zangwill referred to .docx
Assignment DetailsIn 1908, playwright Israel Zangwill referred to .docxAssignment DetailsIn 1908, playwright Israel Zangwill referred to .docx
Assignment DetailsIn 1908, playwright Israel Zangwill referred to .docxfaithxdunce63732
 
Assignment DetailsPart IRespond to the following.docx
Assignment DetailsPart IRespond to the following.docxAssignment DetailsPart IRespond to the following.docx
Assignment DetailsPart IRespond to the following.docxfaithxdunce63732
 
Assignment DetailsPlease discuss the following in your main post.docx
Assignment DetailsPlease discuss the following in your main post.docxAssignment DetailsPlease discuss the following in your main post.docx
Assignment DetailsPlease discuss the following in your main post.docxfaithxdunce63732
 
Assignment DetailsPennsylvania was the leader in sentencing and .docx
Assignment DetailsPennsylvania was the leader in sentencing and .docxAssignment DetailsPennsylvania was the leader in sentencing and .docx
Assignment DetailsPennsylvania was the leader in sentencing and .docxfaithxdunce63732
 
Assignment DetailsPart IRespond to the followingReview .docx
Assignment DetailsPart IRespond to the followingReview .docxAssignment DetailsPart IRespond to the followingReview .docx
Assignment DetailsPart IRespond to the followingReview .docxfaithxdunce63732
 
Assignment DetailsPart IRespond to the following questio.docx
Assignment DetailsPart IRespond to the following questio.docxAssignment DetailsPart IRespond to the following questio.docx
Assignment DetailsPart IRespond to the following questio.docxfaithxdunce63732
 
Assignment DetailsPart IRespond to the following questions.docx
Assignment DetailsPart IRespond to the following questions.docxAssignment DetailsPart IRespond to the following questions.docx
Assignment DetailsPart IRespond to the following questions.docxfaithxdunce63732
 
Assignment DetailsOne thing that unites all humans—despite cultu.docx
Assignment DetailsOne thing that unites all humans—despite cultu.docxAssignment DetailsOne thing that unites all humans—despite cultu.docx
Assignment DetailsOne thing that unites all humans—despite cultu.docxfaithxdunce63732
 
Assignment DetailsMN551Develop cooperative relationships with.docx
Assignment DetailsMN551Develop cooperative relationships with.docxAssignment DetailsMN551Develop cooperative relationships with.docx
Assignment DetailsMN551Develop cooperative relationships with.docxfaithxdunce63732
 
Assignment DetailsInfluence ProcessesYou have been encourag.docx
Assignment DetailsInfluence ProcessesYou have been encourag.docxAssignment DetailsInfluence ProcessesYou have been encourag.docx
Assignment DetailsInfluence ProcessesYou have been encourag.docxfaithxdunce63732
 
Assignment DetailsIn this assignment, you will identify and .docx
Assignment DetailsIn this assignment, you will identify and .docxAssignment DetailsIn this assignment, you will identify and .docx
Assignment DetailsIn this assignment, you will identify and .docxfaithxdunce63732
 
Assignment DetailsFinancial statements are the primary means of .docx
Assignment DetailsFinancial statements are the primary means of .docxAssignment DetailsFinancial statements are the primary means of .docx
Assignment DetailsFinancial statements are the primary means of .docxfaithxdunce63732
 
Assignment DetailsIn this assignment, you will identify a pr.docx
Assignment DetailsIn this assignment, you will identify a pr.docxAssignment DetailsIn this assignment, you will identify a pr.docx
Assignment DetailsIn this assignment, you will identify a pr.docxfaithxdunce63732
 
Assignment DetailsHealth information technology (health IT) .docx
Assignment DetailsHealth information technology (health IT) .docxAssignment DetailsHealth information technology (health IT) .docx
Assignment DetailsHealth information technology (health IT) .docxfaithxdunce63732
 
Assignment DetailsDiscuss the followingWhat were some of .docx
Assignment DetailsDiscuss the followingWhat were some of .docxAssignment DetailsDiscuss the followingWhat were some of .docx
Assignment DetailsDiscuss the followingWhat were some of .docxfaithxdunce63732
 

More from faithxdunce63732 (20)

Assignment DetailsScenario You are member of a prisoner revie.docx
Assignment DetailsScenario You are member of a prisoner revie.docxAssignment DetailsScenario You are member of a prisoner revie.docx
Assignment DetailsScenario You are member of a prisoner revie.docx
 
Assignment DetailsScenario You are an investigator for Child .docx
Assignment DetailsScenario You are an investigator for Child .docxAssignment DetailsScenario You are an investigator for Child .docx
Assignment DetailsScenario You are an investigator for Child .docx
 
Assignment DetailsScenario You are a new patrol officer in a .docx
Assignment DetailsScenario You are a new patrol officer in a .docxAssignment DetailsScenario You are a new patrol officer in a .docx
Assignment DetailsScenario You are a new patrol officer in a .docx
 
Assignment DetailsScenario Generally, we have considered sexual.docx
Assignment DetailsScenario Generally, we have considered sexual.docxAssignment DetailsScenario Generally, we have considered sexual.docx
Assignment DetailsScenario Generally, we have considered sexual.docx
 
Assignment DetailsPower’s on, Power’s Off!How convenient is.docx
Assignment DetailsPower’s on, Power’s Off!How convenient is.docxAssignment DetailsPower’s on, Power’s Off!How convenient is.docx
Assignment DetailsPower’s on, Power’s Off!How convenient is.docx
 
Assignment DetailsIn 1908, playwright Israel Zangwill referred to .docx
Assignment DetailsIn 1908, playwright Israel Zangwill referred to .docxAssignment DetailsIn 1908, playwright Israel Zangwill referred to .docx
Assignment DetailsIn 1908, playwright Israel Zangwill referred to .docx
 
Assignment DetailsPart IRespond to the following.docx
Assignment DetailsPart IRespond to the following.docxAssignment DetailsPart IRespond to the following.docx
Assignment DetailsPart IRespond to the following.docx
 
Assignment DetailsPlease discuss the following in your main post.docx
Assignment DetailsPlease discuss the following in your main post.docxAssignment DetailsPlease discuss the following in your main post.docx
Assignment DetailsPlease discuss the following in your main post.docx
 
Assignment DetailsPennsylvania was the leader in sentencing and .docx
Assignment DetailsPennsylvania was the leader in sentencing and .docxAssignment DetailsPennsylvania was the leader in sentencing and .docx
Assignment DetailsPennsylvania was the leader in sentencing and .docx
 
Assignment DetailsPart IRespond to the followingReview .docx
Assignment DetailsPart IRespond to the followingReview .docxAssignment DetailsPart IRespond to the followingReview .docx
Assignment DetailsPart IRespond to the followingReview .docx
 
Assignment DetailsPart IRespond to the following questio.docx
Assignment DetailsPart IRespond to the following questio.docxAssignment DetailsPart IRespond to the following questio.docx
Assignment DetailsPart IRespond to the following questio.docx
 
Assignment DetailsPart IRespond to the following questions.docx
Assignment DetailsPart IRespond to the following questions.docxAssignment DetailsPart IRespond to the following questions.docx
Assignment DetailsPart IRespond to the following questions.docx
 
Assignment DetailsOne thing that unites all humans—despite cultu.docx
Assignment DetailsOne thing that unites all humans—despite cultu.docxAssignment DetailsOne thing that unites all humans—despite cultu.docx
Assignment DetailsOne thing that unites all humans—despite cultu.docx
 
Assignment DetailsMN551Develop cooperative relationships with.docx
Assignment DetailsMN551Develop cooperative relationships with.docxAssignment DetailsMN551Develop cooperative relationships with.docx
Assignment DetailsMN551Develop cooperative relationships with.docx
 
Assignment DetailsInfluence ProcessesYou have been encourag.docx
Assignment DetailsInfluence ProcessesYou have been encourag.docxAssignment DetailsInfluence ProcessesYou have been encourag.docx
Assignment DetailsInfluence ProcessesYou have been encourag.docx
 
Assignment DetailsIn this assignment, you will identify and .docx
Assignment DetailsIn this assignment, you will identify and .docxAssignment DetailsIn this assignment, you will identify and .docx
Assignment DetailsIn this assignment, you will identify and .docx
 
Assignment DetailsFinancial statements are the primary means of .docx
Assignment DetailsFinancial statements are the primary means of .docxAssignment DetailsFinancial statements are the primary means of .docx
Assignment DetailsFinancial statements are the primary means of .docx
 
Assignment DetailsIn this assignment, you will identify a pr.docx
Assignment DetailsIn this assignment, you will identify a pr.docxAssignment DetailsIn this assignment, you will identify a pr.docx
Assignment DetailsIn this assignment, you will identify a pr.docx
 
Assignment DetailsHealth information technology (health IT) .docx
Assignment DetailsHealth information technology (health IT) .docxAssignment DetailsHealth information technology (health IT) .docx
Assignment DetailsHealth information technology (health IT) .docx
 
Assignment DetailsDiscuss the followingWhat were some of .docx
Assignment DetailsDiscuss the followingWhat were some of .docxAssignment DetailsDiscuss the followingWhat were some of .docx
Assignment DetailsDiscuss the followingWhat were some of .docx
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Cyber capability brochureCybersecurity Today A fresh l.docx

  • 1. Cyber capability brochure Cybersecurity Today: A fresh look at a changing paradigm for government agencies The cyber domain presents endless opportunities to Federal agencies looking for new ways to deliver on their mission and serve citizens, while reducing operational risk. Government is investing in new and innovative technologies that will empower our nation to achieve more. Next-generation identification systems will reduce terrorist and criminal activities by improving and expanding biometric identification and criminal history information services. “Smart” electric grids will make the country more energy independent and increase the use of renewable energies. Intelligent travel systems will make air travel quicker and safer. Electronic medical records are improving access to health care and reducing costs. These investments require up-front planning and preemptive cybersecurity practices to mitigate the inherit risks associated with the advance persistent threat. However, operating in the cyber domain is not without increased risk. Our cybersecurity efforts are matched — if not outpaced — by the sophistication on the part of nimble opponents from other nations, cyber terrorists, cyber criminal syndicates, malicious insiders, cyber espionage — not to mention the inadvertent breach.
  • 2. For better or worse, our cybersecurity efforts are increasingly interconnected with agency mission and programs, inextricably linking daily decisions on performance, workforce management, and information sharing with threat deterrence at every level of the organization. By adopting a proactive, performance- focused, and risk-intelligent approach to cyber initiatives, leaders can help shape their organizations into more proactive, agile, and resilient organizations to protect their people, programs, and mission. Cyber: The new normal Cyber is not just a new domain, it is the new normal. Agency leaders have a critical task ahead of them to take a fresh look at their personnel, policies, processes, and systems to synchronize their cyber initiatives and empower collaboration across departments to protect people, programs, and mission. To strengthen their cyber efforts, today’s leaders are helping drive coordination across functions, agencies, and the private sector toward a shared cyber competence that enables the mission while assigning accountability. Here are some actions agencies should consider: Treat data like a monetary asset. • Understand the value of all your agency’s assets and protect what matters most to the mission and preserve the public’s trust. Follow the flow of information• inside and outside of your agency to identify vulnerabilities; strengthen every link in the chain. Do more with identity management.• Identity, Credentialing, and Access Management (ICAM) offers new opportunities to expand partnerships and add services quickly and cost-efficiently.
  • 3. Make cyber a performance goal.• Agencies that can see what’s valuable to their people and programs will shorten their learning cycle and drive lasting change. Break security from its information technology (IT) • silo. Get everyone — CFO, CHCO, CAO, CIO, CISO, CTO, program leads, and others — at the table to drive change in their department. Adopt a risk-intelligent approach. • A 360-degree view of your agency’s risks helps all departments make better decisions, set priorities, manage investments, and measure results. Automate wherever possible.• Create a disciplined, repeatable, control-based approach to reduce redundancy and rework, and free up employees to focus on managing the mission. Cultivate workforce resiliency.• A cyber-sensitive workplace incorporates role-based cyber training, sets clear performance expectations, and helps protect information security and personal safety. Make room for a new kind of cyber leader. • Look beyond functional and technology expertise when vetting new leaders. Move to a new cyber tempo. • More than just speed, a cyber-savvy agency is agile — whether it is tackling changing cyber threats or agency missions. Cyber innovation. • Utilize the network data within your own enterprise and fuse it with external cyber intelligence to improve mission effectiveness. Deloitte can help Deloitte is committed to helping government achieve its mission and performance goals in the cyber domain by delivering a multidisciplinary perspective that cuts across strategy, people, process, and technology. Deloitte's cyber portfolio aligns with presidential mandates on transparency and accountability to help clients in their efforts to develop
  • 4. both a strong cyber foundation and a proactive cyber posture. “Over the past ten years, the frequency and sophistication of intrusions into U.S. military networks have increased exponentially. Every day, U.S. military and civilian networks are probed thousands of times and scanned millions of times … Adversaries have acquired thousands of files from U.S. networks and from the networks of U.S. allies and industry partners, including weapons blueprints, operational plans, and surveillance data.” — Journal of Foreign Affairs, September 2010 As used in this document, “Deloitte” means Deloitte & Touche LLP, which provides audit and enterprise services, Deloitte Consulting LLP, which provides strategy, operations, technology, systems, outsourcing and human capital consulting services, Deloitte Tax LLP, which provides tax services, and Deloitte Financial Advisory Services LLP, which provides financial advisory services. These entities areseparate subsidiaries of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Security and privacy. • Assessment, remediation, implementation, and integration solutions to help
  • 5. agencies improve risk and compliance, security and privacy, IT governance and technology control, and address the myriad Federal technology- related regulations and frameworks, including Risk Management Framework (RMF), Federal Information Security Management Act (FISMA), ICAM, Homeland Security Presidential Directive 12 (HSPD-12), and more. Forensics and Analytics. • Preventive behavioral analytics-based investigative and forensic tools to improve agency network operations, develop targeted defensive strategies, and to secure important data. Technology. • IT solutions for agency cyber issues, including cyber situational awareness, cyber command and control, secure enterprise architecture, and research and development of new technology innovations. IT transformation and standardization solutions for organizations seeking not only to modernize, but also to establish a resilient cyber operation profile. Strategy and Operations.• Strategy and transformation solutions for cyber organizations to stand up new programs and get existing programs back on track. Human capital management. • A full range of human capital solutions to address agency cyber challenges, including workforce-wide cyber training, culture change, security workforce organization design, and capacity building. Our cyber talent diagnostic tool examines an agency’s existing structure for building cybersecurity capabilities, identifies gaps across the current and desired future state, and provides a prioritized road map for enhancing existing or establishing new cyber talent strategies and solutions. Deloitte’s commitment to cyber: Deloitte was recently selected by the Department • of Homeland Security (DHS) and DHS Secretary Janet Napolitano as the “Best Iconic and Overall
  • 6. Structure” award winner for the 2010 National Cybersecurity Awareness Challenge. Three-year sponsor of the National Collegiate • Cyber Defense Competition (NCCDC). Corporate sponsor of the EastWest Institute (EWI)’s • Worldwide Cybersecurity Initiative and a leading sponsor of EWI’s Annual Worldwide Cybersecurity Summit. Deloitte has approximately 11,000 security and IT • risk professionals. Deloitte has 5,700 Federal practitioners and former • government executives, including cyber leaders and innovators widely recognized by government and the private sector for their contributions to the advancement of cyber thinking. Forensics and analytics Technology Security and privacy Human capital management Strategy and operations Cyber
  • 7. • Cyber research and development • Cyber situational awareness • Secure enterprise architecture • Cyber command and control technologies • Cyber strategy • Cyber transformation • Incident response • Malware analysis • Code deconstruction • Infrastructure assessments • Financial intelligence • Threat intelligence • Secure workforce training and culture • Security workforce organization Design and capacity building • IT risk management • Operations, threat, and vulnerability management • Identity, credential, and access
  • 8. management • Application integrity • Business continuity and resiliency • Privacy and data protection Copyright © 2010 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited Recognition from the experts Top Ranked in Information Security and Risk • Consulting in 2010 by Forrester Rated a• Leader in IT Strategy and Planning consulting in Kennedy Vanguard ITSP Provider Report Rated • Leader in IT Strategy and Planning by Gartner Rated • Top Firm in IT Organizational Redesign by Forrester in 2009 Kennedy Information ranked • Deloitte #1 in Global Talent Management Consulting (2009) Top 20 Contractor• according to Washington Technology’s Top Federal Contractors’ List for 2010 Deloitte’s cyber strategies in action Deloitte’s specialized mix of private-sector perspective and public-sector experience helps clients tackle their most challenging cyber issues. Our multidisciplinary capability and risk-intelligent approach has helped numerous agencies with a wide range of missions. Recently, Deloitte has helped Federal agencies in their efforts to: Achieve 100% FISMA compliance for 80 plus •
  • 9. information systems to reduce the overall level of effort and cost of FISMA activities. Develop and implement an identity and access • management service to support the business and application owners for over 400,000 users. Retrain security personnel in cybersecurity issues, • helping to protect the confidentiality, integrity, and availability of $540 million worth of stakeholder financial data. Develop a FISMA-compliant IT security program, • resulting in the certification and accreditation of 32 critical IT systems and becoming the model for other agencies within the department. Develop a single enterprise-wide IT cybersecurity • environment and architecture for use domestically and overseas, to help identify and control threats. Establish an enterprise authorization capability to • improve information sharing across organizations and communities of interest on the global information grid. Establish a privilege management system to help • facilitate policy-based access control capable of formulating and enforcing fine-grained and dynamic access decisions. Let’s talk With a demonstrated track record of helping public and private-sector organizations around the world achieve cyber success, Deloitte has the people, insights, and experience to help your organization achieve more. How can Deloitte help you? Helping clients achieve more Deloitte continues to invest in resources and tools • to help our clients accelerate cyber initiatives and raise public awareness of the importance of cyber risk issues. These investments include:
  • 10. A global network of 53 security and forensics – labs, including the Electronic Discovery Solution s Center, a 13,000 square foot facility near Nashville, Tennessee, offering cross- platform forensic analysis. Our Center for Federal Innovation, housing – production-ready services and solutions that include current technologies and support real-world deployments in cyber and next- generation citizen services. The center includes the Center for Cyber Innovation, dedicated to the development of strategies for clients grappling with the challenges of increasingly vulnerable information networks. Contact JR Reagan Principal, Deloitte & Touche LLP [email protected] +1 571 882 5870
  • 11. Lt. Gen. Harry D. Raduege, Jr., USAF (Ret) Chairman, Deloitte Center for Cyber Innovation [email protected] +1 571 882 7300 Amry Junaideen Principal, Deloitte & Touche LLP [email protected], +1 202 220 2664