Introduction
The United States Federal Government relies heavily on information technology to drive efficiencies and increase citizen engagement. However, an uptick in cyber attacks and data breaches that affect government operations has created a perfect storm of risks and challenges. Cyber threats continue to have an outsized impact on department and agency operations, which can erode public trust and
reduces the ability to deliver critical mission functions.
In response to destructive cyber attacks, data breaches, budget pressures and public expectations, the U.S.
Government is changing how it addresses cyber threats and larger business risks. The government is now using four new strategies to secure its sensitive information and protect its vital infrastructure:
• Proactive cyber threat hunting
• Increased use and sharing of cyber intelligence data
• Continuous security monitoring, with an emphasis on boundary protection and security event lifecycle management
• Automation and orchestration of security operations