

Thank you for Subscribing to Gov Business Review Weekly Brief
I enjoy taking part in conferences and seminars that include IT and cybersecurity staff from diverse backgrounds, skills, and operating environments. By engaging and listening to different perspectives, insights on current and emerging issues critical to the delivery of an effective local government cybersecurity program can be evaluated, challenged, and addressed. This was particularly true for me during a recent semester long cybersecurity leadership course I took part in that included lively discussions on the challenges facing local government cybersecurity teams.
Let us start with one of the most frequently mentioned challenges - lack of funding. The rapid increase in attacks against local government agencies in recent years has raised the importance of cybersecurity to the board level. Increased attacks, along with rapidly escalating insurance costs and compliance requirements demand that organizations mature their cybersecurity program, and this requires ongoing funding and support. To gain an edge, instead of focusing on lack of funding, focus on developing a program that is in direct alignment with your agency’s risk profile. With the right program in place, spending becomes an investment decision well-supported by a framework, architecture, and strategic plan. Complexity is another often cited challenge - after all, complexity is the enemy of security. But it does not have to be. The business functions and services local government IT portfolios provide are vast, often resembling that of a multinational conglomerate. Disparate systems supporting diverse business functions increases complexity. Sandwich complexity with modern issues like smart cities, hybrid cloud, Internet of Things, AI and machine learning, and the attack surfaces grow exponentially. Since the risk of a security breach in general accelerates at the same rate as complexity, it is not surprising to hear that complexity continues to be a major challenge. But complexity is all around us– if we can measure it, we can manage it. Leverage and apply enterprise security architecture principles and reference architectures that are in alignment with the goals and risk profile of your agency. This process does not have to be costly, difficult, or time consuming, but it does require commitment. Staff shortages are another problem often cited and understood among agency IT leaders. Your cybersecurity staff must have a broad range of enterprise domain, technical, analytical, and communication skills, and this often requires years of experience and training to develop. Cybersecurity staff in general work in a high-pressure environment where the stakes are high. A successful cyberattack can be severe, and this constant pressure can lead to stress and burnout. Most cybersecurity professionals love what they do, but, as a group, we are stressed, making it a strategic imperative leadership support efforts to mature the overall cybersecurity program. " Complexity is all around us– if we can measure it, we can manage it " Lack of funding, complexity, staff shortages, and stress are not the only challenges cited, but as the “digitalization of everything” evolves, so too does the imperative to mature your cybersecurity program so that it can withstand current and emerging challenges. To start, assess your current maturity level with your agency’s goals and objectives. Focus on your weaknesses. This may seem overwhelming at first, but without this step you will not have a solid foundation for a successful program. Leveraging a risk-based cybersecurity framework like the well-known National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) can help. There are other frameworks like ISO 27001 and the CIS; however, the NIST CSF is quickly gaining favor in government agencies. Choosing to implement a Framework like the NIST CSF will allow your agency to: ● Assess and describe the current and targeted cybersecurity posture.I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info