Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Governance, Risk and Compliance, Compliance Management, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Special section: IT security and government

Government agencies at all levels have plenty of data they must protect, not to mention quite a few regulatory mandates to which they must comply. However, for a lot of public entities, more complex challenges often arise. Information security leaders must grapple with seeking increases in funding, additional resources, and buy-in for initiatives from internal divisions and the legislators who usually approve budget hikes.

Click here for the feature Is FISMA working?
Click here for the feature Meeting today's mandates

Additionally, government security and risk teams have to classify and safeguard various levels of data — from confidential internal documents to tax-paying citizens' private details. More and more government agencies rely on the internet and various types of web forms to share and exchange information with their constituents, just like their private counterparts. Too, just like most corporate employees, internal and contracted workers in government use handheld devices, laptops and USB sticks to store and work on critical files. And let's not forget that it's common practice for both private and public entities to communicate about important business initiatives via email or instant messaging. But these efficiencies introduce a host of security problems.

So what must government security leaders be mindful of when it comes to protecting critical data, and what are some of the steps they can consider taking to make their jobs easier? We find out.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.