Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecurityCybersecurity NewsGovernment: Federal, State and Local

US public sector must modernize IT to thwart cyberattacks

By John Zanni
cloud network
May 11, 2022

Many security leaders are still trying to unravel how the pandemic altered how employees communicate and conduct their day-to-day work lives moving forward. The shift to hybrid and remote work has resulted in many positive outcomes, including workers having more flexibility, improved mental health, and of course, a non-existent commute. One area where this shift has had a massive impact is in the cybersecurity realm.

These paradigm shifts have become even more apparent in the government and US public sector, where employees today continue dragging their feet on a full return to the office. As a result, more employees are working remotely and accessing data on uncontrolled networks that are easily susceptible to data breaches — forcing agencies and organizations to think about their cyber protection posture as they witness an astounding increase in cyberattacks.

This comes as no surprise, as government entities harbor incredibly sensitive data, which leads to being a prime target for malicious actors. One doesn’t have to look hard to see a growing list of high-profile cyberattacks taking place within the U.S. public sector. This has pushed the Biden administration to urge private sector companies to provide agencies with the support and help they need to immediately strengthen their cyber best practices.

For organizations to be successful, they must accelerate their cyber defense optimization strategies and look to cloud-based cyber protection solutions to keep them safe from new and persistent threats.

The rise of cloud adoption in the U.S. public sector 

With the work landscape continuing to evolve, the public sector is increasingly dependent on remote networks and data management systems, leading to the mass adoption of cloud computing solutions. In a January 2021 Deloitte survey, 70% of state and local government executives highlighted that the cloud is their preferred environment for hosting citizen and mission data.

The cloud has helped agencies improve efficiency and enabled them to reduce overhead costs. For example, the US Navy recently completed its largest cloud migration to date, moving its Enterprise Resource Planning system from an outdated on-premises system to a modern cloud environment for 70,000 worldwide users. 

Similarly, the Office of Recovery Services (ORS), a Utah Department of Human Services division, migrated its 25-year-old information system from its legacy mainframe to a Java-based application hosted on the cloud, reducing its operational costs by 37%. These trends point to a new cyber defense quandary in the U.S. public sector, as bad actors are now able to facilitate attacks with less effort due to the use of artificial intelligence (AI) and automation tools.

Revamping U.S. public sector cybersecurity policy

Work from home life is here to stay, which means sensitive government data will remain accessible via public cloud networks. The pandemic has exposed many issues within the U.S. public sector’s infrastructure and practices, which entail legacy information technology (IT) systems, siloed systems and outdated databases.

This became clear when many legacy systems could not manage the massive surges in demand for critical services such as unemployment insurance or other human services, which accelerated cloud migration for government agencies.

These all have an array of security vulnerabilities that ultimately result in poor user experiences and major operational delays. It is no question that in today’s cloud-based landscape, public sector agencies can no longer afford to be relaxed about data privacy and security.

The path to zero trust

One of the notable issues with legacy systems is that they do not implement zero trust architecture. Zero trust enforces strict policies that control access to network resources, treating every incoming connection as a potential threat until proven otherwise. While it seems obvious that all government entities should have this in place, it’s challenging to transform these legacy information technology (IT) systems from the ground up, not to mention having to deal with inaccessible funding or a lack of real cybersecurity expertise.

Luckily, with increased funding available through the recent Executive Order on Improving the Nation's Cybersecurity and the Office of Management and Budget (OMB) honing in on a strategy to move the U.S. government toward a zero trust approach, the cybersecurity field is headed in the right direction.

How to utilize existing cybersecurity technology

In order to be fully protected, U.S. public sector agencies must be digitally resilient while being able to meet stringent regulatory, operational, encryption and storage standards.

One of the most important considerations when researching a cloud-based cybersecurity solution is adopting one that has already achieved the necessary certifications and compliance requirements. For example, organizations can adopt solutions that already adhere to industry standards such as HIPAA, CJIS, FIPS 140-2, and NIST SP 800-171. This means they already meet the distinct needs of education, healthcare, criminal justice, nonprofit organizations and state and local governments.

With increased pressure being placed on government entities, the U.S. public sector’s IT transformation efforts are headed in the right direction. However, cybersecurity practitioners in the public sector are nowhere near the end goal. The good news is cybersecurity transformation doesn’t have to be years away — but, to achieve this, trusted, certified solutions will need to be mandated. This will be key for these agencies to become adept at keeping up with cloud adoption and mitigating the risk of attacks.

KEYWORDS: artificial intelligence (AI) cloud migration cyber security initiatives federal government security information technology IT security zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Zanni is CEO of Acronis SCS.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-shield-freepik1170x658.jpg

    US enterprises at risk; Russian cyberattacks could disrupt public safety, critical infrastructure

    See More
  • voting election

    It’s time to modernize the voting process

    See More
  • Cyber attack

    Cyberattacks target IT and communications sector in 2021

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing