We used to think of security in terms of fences, barred windows, and barricades to physical locations. Then, with the rise of computers and other technologies, we began to worry about the virtual perimeter of organizations. Government information systems became more complex, and our security concerns shifted inward to the vulnerabilities of our networks.
But the reality is that security concerns haven’t merely shifted; they have expanded. Today, government agencies have to secure physical, network, and cyber systems.
In this course, we’ll examine the components of an effective security strategy that addresses all necessary systems. We’ll also explain how to combine those different considerations to truly secure your agency from a holistic standpoint. To offer further insight, we’ll hear from Mindy Marvel from Alliance Technology Group and Don Turner from Avaya Government Solutions.
To learn even more about how to create holistic security, check out these additional resources:
- Guide to Securing the Everywhere Perimeter
- Leave Behind and Security Assessment
- Vigilant Platforms
Thank you to Avaya and Alliance for this public sector resource.