govciooutlook
March-20178GOVERNMENT CIO OUTLOOKA Look at Effective Cybersecurity Solutionsne of the key challenges and apparent contradictions of effective cybersecurity solutions is that while cyber attacks often can target specific vulnerabilities existing within a singular organization, we need a comprehensive connection of multiple organizations and partnerships to defend our systems successfully. As we've learned, it takes a network to protect a network. And in Wisconsin, we understand that network has to be much bigger than just state government. It has to enable statewide collaboration among public-sector and private-sector partners to protect Wisconsin's critical systems. Therefore we have established teams of state and local government representatives, as well as private-sector critical infrastructure owners and operators, to provide strategic and planning direction for cyber resources across the state. These teams have produced an overarching cyber disruption response strategy and helped to organize statewide cybersecurity summits. They're now guiding efforts to design and implement specific operational plans to respond to cyber disruptions while ensuring timely and actionable communications between the various partners. This is not easy work­it requires a level of cooperation and flexibility that most organizations, public or private, aren't used to. But in Wisconsin, we have concluded this widely collaborative approach is the only kind that can safeguard our systems and maintain critical services to our residents.While it takes a network to protect a network, as the State CIO and Chief Information Security Officer, we realize that first of all we have important cybersecurity business to take care of here at the state's Division of Enterprise Technology (DET). We have to ensure our state data center delivers an environment where agency applications can process securely and reliably. Then we must also provide the cybersecurity tools and architecture that are sustainable and repeatable to implement in other state agencies. Although most agencies had their own versions of security plans, Wisconsin's recent transition to shared infrastructure services required the We have to ensure our state data center delivers an environment where agency applications can process securely and reliablyDavid Cagigal, CIO and Bill Nash, CISO, State of WisconsinByDavid CagigalOIN MYPINIONO
< Page 7 | Page 9 >