
U.S. Federal CIO priorities to comply with the Executive Order to improve cybersecurity
U.S. Executive Order 14028 identifies requirements for U.S. federal agencies, including the need for accelerated adoption of cybersecurity tools and cloud services. This report is designed to help federal agency CIOs prioritize actions to comply accordingly.
Executive Order 14028 details requirements for cybersecurity and cloud
“The Executive Order contains a number of specific mandates for FCEB agencies. These relate to assessments, reports, and the deployment of specific security tools, such as multifactor authentication, encryption and zero trust architecture (ZTA). In addition, agencies are mandated to accelerate the adoption of cloud-based solutions and the deployment of EDR solutions.”
Federal CIOs face ongoing challenges when managing, securing, and maintaining IT and OT networks. Operating at the speed of cyber to ensure security and visibility is difficult with existing legacy infrastructure and operating procedures. As proven by recent cyberattacks, federal agencies can’t rely on prevention and detection capabilities alone when it comes to safeguarding mission-critical data. Detection starts at the endpoint.
Tanium gives federal agencies the ability to stay ahead of cyber threats with superior visibility and control of endpoints using a single platform. With a comprehensive view of endpoints in real-time, CIOs and their teams can make informed decisions about current environments and develop a roadmap to address future challenges.
This report covers:
- How federal CIOs should prioritize immediate actions to comply with this order
- What future requirements CIOs must begin preparing for to continue work with vendors and contractors
- How a unified endpoint solution can provide CIOs with visibility and control to deploy necessary updates
Gartner, U.S. Federal CIO Priorities to Comply With the Executive Order to Improve Cybersecurity, Katell Thielemann, 15 July 2021
Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved
Download the Report
Complete this form to download the report.