Forcepoint’s George Kamis: Agency Digital Transformation Efforts Should Involve User-Centric Data Security

Jeff Brody
George Kamis

George Kamis, chief technology officer for global governments and critical infrastructure at Forcepoint, has said that government information technology professionals should adopt a user-centric approach to strengthen  cybersecurity as part of their digital transformation efforts.

In a GCN guest piece published Friday, Kamis wrote that implementing user-centric security procedures will help agencies improve network visibility and address vulnerabilities when deploying cloud computing services, open-communications technology and hyperconnected systems.

He urged agency IT specialists a personalized approach that can facilitate proper monitoring of high-risk information and put more focus on securing users’ interaction with data.

“Agencies must ensure that their security procedures evolve, too, especially as they undergo digital transformation,” Kamis said. “Organizations must move toward a targeted cybersecurity strategy that strengthens security while affording employees the freedom they need to be productive and transformative.”

He cited Verizon’s 2019 Data Breach Investigations report that says state-affiliated entities has accounted for 79 percent of data breaches executed by external hackers.

You may also be interested in...

Naval Strike Missile

State Dept Clears $300M Sale of Raytheon Technologies-Made Naval Missiles to Romania

The State Department approved Romania's request to buy anti-ship missile systems manufactured by Raytheon Technologies (NYSE: RTX) through a potential $300M foreign military sale transaction with the U.S. government. The company's missiles and defense business would deliver two units of the Naval Strike Missile Coastal Defense System and complementary equipment to Romania's government under the potential deal, the Defense Security Cooperation Agency said Friday.

August Jackson Senior Director Deltek

ArchIntel’s AI in Competitive Intelligence Virtual Event to Discuss Maintaining Competitive Advantage

Artificial intelligence (AI), machine learning (ML) and big data have transformed how businesses conduct competitive intelligence (CI) and how our stakeholders use the developed analyses. Additionally, the federal government has integrated emerging technologies to remain competitive across the defense landscape. To register for ArchIntel’s AI in Competitive Intelligence Virtual Event, as well as view upcoming opportunities, visit ArchIntel’s Event Page.