From moving data and systems to the cloud to information sharing in support of data driven government initiatives and collaborating with partners there are myriad opportunities for risks to data integrity and overall network security.
And as more data and systems move off premise into the cloud, the need for stronger information security and governance standards. Authentic security starts with next generation authentication and impeccable password hygiene, not just password management and two factor authentication.
Several key cybersecurity risks were identified. Chief among them new threats, funding that is not commensurate with risk, and the talent crisis.
One of the greatest risks to data integrity and network security is the Internet of Things (IoT). Utah's CTO, Dave Fletcher, outlined why states need a road map for IoT and cyber security needs to be part of that road map and baked in to all products, services, and systems.