Public Sector Cybersecurity Weekly Briefing 07-13-2018

Critical Informatics Recognized by Gartner in the 2018 Market Guide for MDR Services
“Our platform is purpose-built for highly regulated sectors such as healthcare, finance, and government. We don’t require any agents to be deployed, nor additional technology purchases. Using packet capture, we can protect regulated records while retaining the ability to conduct investigations and confirm incidents with 100% accuracy. We keep those packets on the customer’s premise inside their protected perimeter. All of this means a seamless implementation and elimination of more false positives.


With Russian Hacking Fresh in Mind, Washington State Beefs up Elections Cybersecurity
Washington is widely considered to have one of the more secure elections systems, in part because its mail-in balloting means the state has a paper record for almost every vote cast. Those ballots can always be recounted, if any question emerges. Still, national experts agree Washington has some spots that could be compromised by hackers, such as votes returned by email from members in the military, and a voter-registration system run by the state Department of Licensing that recently ran into trouble.


Inside the White House’s Cybersecurity Risk Report
But what can federal agencies and their stakeholders take away from the report, and what do the results mean for the state of cyber risk and the future of national security? And ultimately, what needs to be done? To break all this down, GovernmentCIO Media sat down with the former first federal chief information security officer and current president of Cyxtera Federal Group, Brig. Gen. Gregory Touhill. Touhill is a retired U.S. Air Force officer and combat veteran, and he was appointed to serve as CISO by former president Barack Obama in 2016.


Stay up to date on the Public Sector Information Security news that you need to know by signing up for our Public Sector Briefing Here.


Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners.  © 2017 Critical Informatics, Inc. All rights reserved.