generated from cloud-gov/pages-uswds-jekyll
-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #603 from GSA/cms/news/cybersecurity-starts-in-the…
…-security-operations-center Automatically generated. Merged on Netlify CMS.
- Loading branch information
Showing
1 changed file
with
29 additions
and
0 deletions.
There are no files selected for viewing
29 changes: 29 additions & 0 deletions
29
_news/news/cybersecurity-starts-in-the-security-operations-center.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
--- | ||
layout: news | ||
publisher: FEDERAL NEWS NETWORK | ||
title: Cybersecurity starts in the Security Operations Center | ||
url-link: https://federalnewsnetwork.com/federal-insights/2024/02/cybersecurity-starts-in-the-security-operations-center/ | ||
publication-date: February 13, 2024 | ||
description: The Security Operations Center (SoC) at a federal agency plays a | ||
crucial role in cybersecurity, consisting of experts who monitor systems to | ||
prevent or respond to security threats. Recent years have seen an increase in | ||
procedures to protect SoCs, guided by federal directives and a cybersecurity | ||
executive order enhancing cloud and network security. Management complexities | ||
arise regarding leadership and incident response, with a mix of federal | ||
employees and contractors involved. Jennifer Franks from the Government | ||
Accountability Office highlights the importance of a diverse skill set, | ||
information sharing, and the challenges of managing sensitive data across | ||
different agencies. Protecting critical services requires continuous effort, | ||
risk management, and readiness to respond to incidents. | ||
synopsis: >- | ||
* SoCs are essential for monitoring and responding to cybersecurity threats in | ||
federal agencies. | ||
* Federal guidance and a cybersecurity executive order have strengthened SoC protections. | ||
* Management involves a mix of federal employees and contractors, with complexities in leadership and incident response. | ||
* Information sharing between agencies is crucial but challenged by varying sensitivities of data. | ||
* Continuous protection, risk management, and incident response planning are fundamental to SoC operations. | ||
--- |