Increasing the effectiveness of the federal role in cybersecurity education

With cyber threats growing, however, the United States faces a severe shortage of properly trained and equipped cybersecurity professionals.
Key lock


Federal Cyber Risk Services

Make your agency Secure.Vigilant.Resilient.™

Federal agency security investments are at an all-time high, yet cyber-attacks are still on the rise, both in number and sophistication. While today’s constantly evolving, fast-paced technology powers new strategic and mission initiatives, it also opens new doors for cyber criminals. Our Secure.Vigilant.Resilient. approach helps you manage the cyber risk you know and get ahead of the ones you don’t.

What does it mean to be Secure, Vigilant, and Resilient?

Latest insights

Changing the game on cyber risk: Be secure, vigilant, and resilient

The strategic things you do to achieve your mission are at the heart of the cyber risks your agency faces. A Secure.Vigilant.Resilient.™ cyber risk program is not just about spending money differently–it’s a fundamentally different approach.

Change the game: Understand your organization through an adversarial lens

Analyzing an agency’s external footprint from an adversary’s perspective can enable proactive detection, prioritization, and effective mitigation of cyber threats.

Government’s cyber challenge: Protecting sensitive data for the public good

For government, cybersecurity isn’t only a challenge—it’s a big obstacle to long-awaited digital transformation. Plus, the stakes are sky-high: Hacking public-sector information might imperil national security as well as citizens’ trust. Is government up to the task?

3D opportunity and cyber risk management

While cyber risk is pervasive, additive manufacturing (AM) is one area where it can be especially dangerous, due to AM’s reliance on digital files and connectivity, and the impact on multiple parties through the supply chain.

A world beyond passwords: Improving security, efficiency, and user experience in digital transformation

There’s a reason why many of us use the same password for every login: Who can remember dozens of different combinations of numbers and letters? Technology is on the verge of rendering passwords obsolete, bolstering security as well as making users and customers happier.

For more insights, check out the entire Deloitte University Press Collection on cyber risk.

Back to top

Lock the keyboard

Cybersecurity is becoming increasingly vital to accomplish mission objectives, which means agencies should consider instituting a culture of cybersecurity rather than looking at technology to support control and/or compliance issues.

Deborah Golden, Federal Cyber Risk Services leader

In the news

A cyber risk imperative: All hands on deck
Source: Wall Street Journal – September 7, 2016

A great primer on cyber
Source: Federal Computer Week – August 10, 2016

Supercomputers power cyber-as-a-service offering
Source: Fedscoop – July 21, 2016

Michael Daniel: Cyber workforce goes beyond 'coders at the keyboard'
Source: Fedscoop – July 20, 2016

How military strategy can improve cyber response
Source: Federal Computer Week – July 18, 2016

Industry, government relationship slow to transform cyber habits
Source: Federal News Radio – June 8, 2016

How to structure cyber incident response
Source: Wall Street Journal – December 9, 2015

Back to top

For media inquiries, please contact:

Megan Doern
Deloitte Services LP
+1 202 368 0524

Chess piece

Strategy and Governance

Achieving and maintaining a Secure.Vigilant.Resilient. posture requires ongoing effort to define an executive-led cyber risk program, track progress, and continuously adapt the program to shifting agency strategies and the evolution of cyber threats.

Strategy and Assessment projects develop actionable roadmaps to support the evolution of legacy IT security programs into Secure.Vigilant.Resilient.™ programs.

Enterprise Security Architecture defines next generation architecture to support agency innovation and mitigate emerging threats.

Governance, Risk, and Compliance services provide risk transparency to agency leaders, line managers, and other stakeholders through technology implementation and data integration.

Third-Party Risk services assist in managing cyber and operational risks across the extended agency.

Back to top

Mouse Stick

Managed Services

Deloitte’s tailored, high-touch managed, and subscription services can help you operate more efficiently, address talent shortages, achieve more advanced capabilities, and keep on track with your overall cyber risk program objectives.

Back to top

The eISCMS approach

eISCMS: enterprise Intelligent Security Configuration Management as a Service

Agencies spend enormous amounts on managing the security configurations of tens of thousands of devices. As an agency expands or teams with others, their responsibilities grow, requiring the protection of new capabilities and, most importantly, data. Deloitte Advisory offers continuous system and device configuration, including advanced, threat-aware secure configuration design and automated configuration execution using market-leading technologies.

Learn more about eISCMS as a service.

Back to top

Road surrounded by trees

More topics


Federal Shared Services

Deloitte's Shared Services practice is cross-functional and shares knowledge, methodologies, and tools across Deloitte’s Federal and Commercial practice.


Cyber Risk Services

We help organizations address information and technology risks, such as cyber security, data leakage, identity and access management, and data security.


Digital Customer Experience

Learn how Deloitte is helping agencies infuse new ideas and technologies into their customer service and delivery programs.

Ed Powers

US Managing Principal | Cyber Risk Services

Emily Mossburg

Principal | Resilient Services

Adnan Amjad

Partner | US Cyber Threat Risk Management

Michael Wyatt

Cyber Risk Services Leader | State Government


Life at Deloitte

People make Deloitte one of the best places to work. What’s great about the people? That’s an easy answer. They are exceptional. Each person is unique and valued for that, among the best and brightest in the business, and takes pride in his or her achievements and the success of others.