When the C-suite truly understands how important critical cyber security is to their organization’s reputation and bottom line, the whole organization gets it. That is a new version of the trickle down theory.
Once the word goes down, it takes the whole organization working in concert to give a company, government agency, or non-profit a fighting chance to fend off today’s array of cyber threats.
Data Framework: EU-U.S. Privacy Shield
DHS Pact for DDoS Protection
NIST Seeks to Update Security Framework
DHS Awards Cyber Physical System Contracts
That is where the newly dedicated national laboratory facility created to support the nation’s digital economy through advanced cyber security comes into play.
The National Cybersecurity Center of Excellence (NCCoE) in Rockville, MD, is a public-private partnership launched by the Commerce Department’s National Institute of Standards and Technology (NIST) in 2013.
After more than two years working in cramped temporary quarters, NCCoE’s new facility provides five times the laboratory space previously available for collaborative advanced information technology projects.
“I fought to put funds in the federal checkbook for this center, and I’m proud to stand here at this opening,” said Senior Senator from Maryland Barbara Mikulski. “NCCoE brings the best of government experts together with world-class IT companies to make America more secure and create new jobs.”
Secretary of Commerce Penny Pritzker strongly agreed, saying that economic security through strong cybersecurity “is national security,” and “companies and their boardrooms are our country’s front lines.”
The New York Power Authority became the first utility to publicly pledge to adopt a new NCCoE-developed cyber security guide for identity and access management.
The NCCoE adds a single collaborative space where government and industry can brainstorm and assemble off-the-shelf commercial products into practical solutions for today’s toughest cybersecurity issues.
Building-block solutions for a wide array of IT fields are already under way in access control, data integrity, smart card credentials, secured email, mobile device security, privacy-enhanced identity brokers, software management, and trusted geolocation.