Sunday, December 7, 2025
Email Us
Info Security Watch
No Result
View All Result
Info Security Watch
No Result
View All Result
Home Threat Detection

Governments Urged to Get Back to Basics to Stay Ahead of Cybersecurity Threats

Administrator by Administrator
September 10, 2024
in Threat Detection, Defense, Cyber Defense, Artificial Intelligence, Cyber Hygiene, Zero-Day, Global Cybercrime, Global Threats, News, Government, Threat Intelligence, Cybersecurity, Threat Hunting, Cybersecurity Architecture Design
385 21
0
Cybersecurity, Government Cybersecurity, AI, Zero Trust, Cyber Hygiene, Global Cybercrime, Cybersecurity Strategy Categories: Cybersecurity News, Government Cybersecurity, Global Threats

Cybersecurity, Government Cybersecurity, AI, Zero Trust, Cyber Hygiene, Global Cybercrime, Cybersecurity Strategy Categories: Cybersecurity News, Government Cybersecurity, Global Threats

558
SHARES
2.5k
VIEWS
Share on FacebookShare on Twitter

Governments Urged to Get Back to Basics to Stay Ahead of Cybersecurity Threats

Global cybercrime costs are expected to reach $10.5 trillion annually by 2025, up from $3 trillion in 2015. Government institutions are frequent targets for cybercriminals and state-sponsored actors, posing increasing risks to their systems and assets.

In a Global Government Forum webinar, expert panelists from the US federal government, the United Nations, and the private sector discussed strategies for improving cybersecurity and services for users.


Cybersecurity Challenges and Solutions

Paul Selby, Deputy Chief Information Officer and CISO at the US Department of Energy, delivered a sobering evaluation of the current state of cybersecurity. Despite years of industry focus on the topic, Selby remarked, “If we were to do an objective assessment, I think we’d have to give ourselves very poor marks for where we actually are in cybersecurity.”

Selby emphasized the need for organizations to return to basic cyber hygiene practices, noting that many applications still lack essential security measures such as multi-factor authentication and data encryption.

The Department of Energy, which employs over 125,000 people across 17 national laboratories and 37 field offices, recently launched its own cybersecurity strategy. This strategy aligns with the Biden administration’s five-pillar national strategy, which focuses on:

  1. Defending critical infrastructure
  2. Disrupting and dismantling threat actors
  3. Shaping market forces to drive security and resilience
  4. Investing in a resilient future
  5. Forging international partnerships to pursue shared goals

Global Collaboration and Cybersecurity as a Developmental Challenge

Yu Ping Chan, head of digital partnerships and engagement at the United Nations Development Programme (UNDP), emphasized the need for global cooperation in cybersecurity. She highlighted that many developing countries face significant challenges, including a lack of cybersecurity skills, language barriers, and limited internet access in rural areas.

Chan stressed the importance of treating cybersecurity as a developmental challenge, not just a technical one. The UNDP is working with the International Telecommunications Union (ITU) to help developing nations build cyber capacity. Discussions are underway with the US government to fund programs aimed at addressing cybersecurity capacity gaps.


Implementing Zero Trust and Modern Solutions

Ryan Zacha, principal solutions architect at Booz Allen, discussed the zero trust model, which assumes no user, device, or system is inherently trustworthy. Zacha highlighted the importance of building security by design and leveraging modern solutions to enhance cybersecurity while improving system performance.

In July 2024, a White House memo directed federal agencies to align budget requests with the national cyber strategy and implement zero trust solutions. Zacha noted the success of applying DevSecOps in mission-critical projects, such as healthcare.gov and Department of Defense data platforms, to ensure security is integrated from the start.


The Role of AI in Cybersecurity

Jason Ralph, director of the Security Operations Center at the US Department of Labor, pointed out that artificial intelligence (AI) is playing a growing role in cybersecurity. While AI can streamline processes such as transcription and customer support, Ralph cautioned that defensive measures must be in place to ensure AI tools are functioning as intended.

The department has adopted a zero trust framework and is working on initiatives such as authentication enhancements, data encryption, and log ingest improvements to combat phishing and other evolving threats.


Evolving Threat Landscape

The speakers stressed that while cyber threats are constant, the tools and techniques used by both attackers and defenders are evolving. Technologies like generative AI are making phishing attacks more sophisticated, and quantum computing poses a future threat as adversaries collect data now to decrypt it later.

As Zacha remarked, “The ‘water rises lift all boats’ approach is probably a great way to look at this. As we increase cybersecurity spending across the global environment, that helps security around the globe in all ways.”


Governments worldwide must focus on cyber hygiene, invest in resilient cybersecurity infrastructures, and foster international collaboration to stay ahead of the growing cybersecurity threats.

Tags: CybersecurityGlobal CybercrimeAIGovernment CybersecurityZero TrustCyber HygieneGlobal Threats
Advertisement Banner
No Result
View All Result

Trending

Internet Security, Zero Trust, Multi-Factor Authentication, Real-Time Threat Intelligence, AI in Cybersecurity, Market Report
Market Trends

Internet Security Strategic Business Report 2023-2030

September 11, 2024
BreachSeek, AI Penetration Testing, Cybersecurity, LangChain, LangGraph, LLMs, Vulnerability Testing, KFUPM
Artificial Intelligence

BreachSeek: AI-Based Automated Multi-Platform Penetration Testing Tool

September 10, 2024
Endpoint Privilege Management, PAM, CISOs, Cybersecurity, ThreatLocker, Administrative Privileges, Insider Threats
Endpoint Security

Navigating Endpoint Privilege Management

September 11, 2024
Hussein Syed, RWJBarnabas Health, CISO, Cybersecurity, Healthcare Security, Becker’s Hospital Review Healthcare Cybersecurity, Industry Recognition, Leadership
Healthcare Cybersecurity

Hussein Syed, RWJ Barnabas Health CISO, Honored as One of 54 CISOs To Know Nationwide

September 10, 2024
Cybersecurity, Government Cybersecurity, AI, Zero Trust, Cyber Hygiene, Global Cybercrime, Cybersecurity Strategy Categories: Cybersecurity News, Government Cybersecurity, Global Threats
Threat Detection

Governments Urged to Get Back to Basics to Stay Ahead of Cybersecurity Threats

September 10, 2024
Terrorist Organizations Exploit Financial Systems for Funding
Financial Crimes

Terrorist Organizations Exploit Financial Systems for Funding

September 8, 2024
Info Security Watch

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow Us

Recent News

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

November 14, 2024
Computer Security Market Advancements Highlighted by Key Drivers and Innovations: Strategic Insights and Forecasts to 2031

Computer Security Market Key Drivers, Innovations, and Forecasts to 2031

September 18, 2024
New York, United States of America
Sunday, December 7, 2025
Clear
2 ° c
-1 c -6 c
Mon
2 c -8 c
Tue
  • About
  • Terms of Service
  • Affiliate Disclosure
  • Disclaimer
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Information Security
  • Cybersecurity
    • Intrusion Detection & Prevention Systems (IDPS)
    • Data Loss Prevention (DLP)
    • Threat Hunting
    • Secure Remote Access
    • Data Centre Security
    • Cybersecurity Architecture Design
    • Behavioral Analytics
    • Mobile Security
    • Wireless Network Security
    • Privileged Access Management (PAM)
  • OSINT (Open Source Intelligence)
    • OSINT Techniques
    • Sentiment Analysis
    • Image & Video Analysis
    • OSINT for Financial Crime
    • Automated Threat Intelligence Platforms
    • Human Intelligence (HUMINT) Integration
    • Cybercrime Investigation
    • Geolocation Intelligence
    • Metadata Analysis
    • OSINT in Crisis Response
    • Counterterrorism OSINT
  • Digital Forensics
    • Database Forensics
    • Malware Forensics
    • Video Forensics
    • Audio Forensics
    • Anti-Forensics Techniques
    • Forensic Report Writing
    • Cross-Border Digital Investigations
    • Cryptocurrency Forensics
    • Digital Evidence Preservation
    • Legal and Regulatory Forensics
  • Cybersecurity Compliance & Risk Management
    • Compliance
    • Cyber Risk Quantification
  • Financial Analysis
    • Financial Crimes
    • Financial Systems
    • Financial Security
    • Offshore Accounts
    • Shell Companies
    • Terrorist Financing
    • Money Laundering
    • Fraud Detection
  • Business
  • Blockchain
    • Cryptocurrency
  • Investigations
    • Corporate Investigation
    • Investigation Tools
    • Investigative Journalism
  • Data Privacy
    • Data Protection,
  • Intelligence Gathering
    • Data Gathering
  • Dark Web
  • Global Security
    • Cyber Defense
  • Threat Intelligence
    • Cyber Risk Quantification
    • Social Media
    • Report
    • Supply Chain Security
    • Threat Detection
  • Defense
    • Offshore
  • Privacy Policy
  • Framework
    • Government
    • Illicit Funds
    • IoT Security
  • Networking
  • Public Records
  • Ransomware
    • Ransomware Attacks
  • Vulnerabilities
  • Tools
  • Enterprise
  • Artificial Intelligence
  • Quantum Computing
  • Zero-Day
  • Disclaimer
  • Affiliate Disclosure
  • Terms of Service
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved