The Root of Cyber Security


FBI Insignia

This week we are looking at Michele Sandiford, from the Federal News Network, discussing the need for, and directives of Cyber Security in the U.S Federal Government. Coming from her post titled Cybersecurity starts in the security operations center, we begin with discussing the functionality of Cyber Security: what role does Cyber Security play in the grand scheme of an organization? By extrapolating this discussion on the impact of Cyber Security on the federal government, we can better understand the necessity of cyber security in private organizations.

Standiford begins her argument by explaining that in order to understand the functionality of cybersecurity at a federal agency, one might start by looking at the organization’s security operations center. She deliberates on how challenges arise in sharing incident data due to differing risk profiles, especially concerning sensitive data, and carefully conveys examples on how sharing data looks in a day-to-day situation when it comes to dealing with data as sensitive as that which the federal government deals with. She concedes with admitting that not much work would ever get done without a collaborative effort.

“The right tools for the workforce…. But sometimes new tools can be a double-edged sword”

Michele Sandiford, Federal News Network

Michele gets a little too close to espionage when explaining how the workforce within the Security Operations Center comprises a mix of federal and contractual personnel, each contributing essential expertise. Training and knowledge transfer are crucial, especially when contractors handle sensitive data requiring specialized management. She stresses the importance of continuous vigilance, acknowledging that cybersecurity is an ongoing endeavor, emphasizing the importance of training relevant personnel. Standiford surmises her explanation in exclaiming that preparedness through security assessments and risk management frameworks is paramount to effectively respond to inevitable cyber incidents.


Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.