Tactics in Federal Cyber Incident Reporting
![Tactics in Federal Cyber Incident Reporting](http://govciomediaresearch.imgix.net/wp-content/uploads/2024/05/1000x650_Axonius_Federal_DD.jpg?fit=max&auto=format&cs=adobergb1998&auto=compress)
High-profile data breaches and other security incidents against critical systems have increased prioritization on cyber incident response and reporting to both public and private sector entities. Amid broader policies and regulations, agencies are implementing new tools and strategies to respond to cybersecurity breaches.
Learn:
- The importance of a prepared workforce for cyber resilience.
- About cyber reporting recommendations.
- Effective ways to respond to incidents.
- The coming rule for reporting cyber threats.
![Tactics in Federal Cyber Incident Reporting](http://govciomediaresearch.imgix.net/wp-content/uploads/2024/05/1000x650_Axonius_Federal_DD.jpg?fit=max&auto=format&cs=adobergb1998&auto=compress)
-
Mark Bacharach Deputy Director, Office of Information Security and Privacy, EPA
-
Don Bauer CTO, Bureau of Global Talent Management, State Department
-
Arthur Chin CTO, Federal Highway Administration
-
Sean Connelly Former Zero Trust Director, CISA
-
Jen Easterly Director, CISA
-
Clare Martorana Federal CIO, OMB
-
John Schneider Senior Systems Engineer, Axonius Federal
-
Federal Tech Chiefs Highlight Evolving Priorities
Leaders from NARA, VA, FEMA, Coast Guard and FDA share how IT and cybersecurity transformation is playing out.
3m read -
Federal Tech Leads Reflect on What Makes Great CX
Following mandates to improve the customer experience, officials are embracing new workforce development approaches.
3m read -
Feds Call for Harmonization of Cybersecurity Regulations
Cyber leaders say an inclusive regulatory framework approach and expansion of the workforce would help better prevent cyberthreats.
4m read -
Post-Quantum Cryptography Success Relies on a Strong Workforce
The federal workforce sees need for training and education amid growing priorities around post-quantum cryptography for cybersecurity.
3m read