Remove Case Study Remove Government Remove Military Remove Strategy
article thumbnail

Information Disaster Plan

The Texas Record

What types of information is your government creating? Where are your government’s offices geographically located? Also research the impact of the information’s proximity to potential man-made hazards, for example the airport, military bases, plants or factories that handle hazardous or flammable material.

Paper 98
article thumbnail

SHARED INTEL Q&A: Bi-partisan report calls a for a self-sacrificing approach to cybersecurity

The Last Watchdog

Here’s the exchange, edited for clarity and length: LW: Should we be more concerned about cyber exposures than classic military threats? Romanoff: Classic military threats will always merit significant concern due to their direct impact on life. Last Watchdog queried Tom Romanoff, BPC’s technology project director about this analysis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

So maybe the government steps in and makes it easier for that organization to get insurance? GRAY: One of the other questions that you know has been a big one in the last year, so is should the government come in and subsidize, subsidize and establish a base insurance capability? Yeah, we're all good. What effect does that have?

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

In response, President Biden last week issued an executive order requiring more rigorous cybersecurity practices for federal agencies and contractors that develop software for the federal government. government. government should provide and curate a catalog of resources, such as configuration, tools, etc.,