preview

Cyber Terrorism Defense Plan

Decent Essays

While we have always been an efficient organization, with low administrative expenses, I fully appreciate that SSA must continually strive to improve how it invests resources, particularly in IT. Consequently, transforming the information technology investment process has been one of my highest priorities as the Chief Technology Officer. Over the next year, we will develop an IT Investment Process (ITIP) that will improve the way we manage and invest in IT at SSA.
Consistent with FITARA, ITIP will focus on an up-front cyber terrorism defense plan with outcomes tied to specific agency goals. Improved project planning and documentation will allow us to assess project costs and timelines with greater accuracy. In addition, an enterprise-wide …show more content…

Our program incorporates these security capabilities into a comprehensive, multi-layered defensive approach for ensuring the confidentiality, integrity, and availability of the public’s sensitive personally identifiable information. As we continue to provide new opportunities for better customer service through new online services, we must remain vigilant in continuing to strengthen our cyber terrorism program capabilities. To that end, we proactively try to penetrate our own information systems daily to rigorous test and analyze any points of vulnerability. We continuously learn more about the ways hackers may try to gain access to our systems, and we continuously devise ways to stop them. Therefore, our cyber terrorism defense program will overpass the performance standards to remain strong, we will continue to evolve our cyber terrorist defense program to reflect changes in technology, changes to business processes, and changes in the complexity of internal or external threats. Continued investments in cyber terrorism projects and initiatives will ensure we have the resources needed to accomplish our agency’s mission and thus maintain public confidence in the agency’s ability to protect their …show more content…

We work diligently to protect our information, detect attacks, identify suspicious activities, and systematically respond to software and hardware vulnerabilities. We realize that technical solutions alone cannot combat adversarial threats in today’s threat landscape, and it is not a single technology or process that keeps Social Security information safe, but rather an integrated, holistic approach comprised of many different technologies, processes, procedures, standards, guidelines and awareness programs. Our defense-in-depth strategy is composed of the following seven

Get Access