Cybersecurity: Public Sector Threats and Responses

Posted on by Ben Rothke

One of the myriad benefits of the Internet has been the increase in efficiency and speed of communications. What used to take days and weeks to transmit can now be sent instantly with Facebook, e-mail, Twitter, and the like. In Cybersecurity: Public Sector Threats and Responses, author Kim Andreasson provides an over­view of how government agencies and other public-sector groups can use the Internet without introducing unnecessary risks to their constituents.

The book recognizes that the Internet has rapidly changed the way the public sector interacts with citizens. The quick ramp-up to Internet connectivity has led many public sector agencies to give short shrift to the issues of security and privacy. This work provides a high-level overview of security trends surrounding the effort to make government more connected, taking a broad approach with a heavy international focus. Numerous case studies demonstrate how agencies worldwide have dealt with the threats and vulnerabilities involved in moving to an e-government mode.

One challenge that governments face is that they often move at a snail's pace, while security threats move substantially more quickly.

For those who need a highly detailed approach to cybersecurity in the public sector, this may not be the best title. But for those seeking a broad overview of the topic, Cybersecurity: Public Sector Threats and Responses is a good starting point.

Ben Rothke

Senior Information Security Manager, Tapad

forensics & e-discovery

Blogs posted to the website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.

Share With Your Community

Related Blogs