{"id":178451,"date":"2023-01-23T14:00:39","date_gmt":"2023-01-23T22:00:39","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=178451"},"modified":"2023-01-23T14:25:10","modified_gmt":"2023-01-23T22:25:10","slug":"nascio-top-10-for-2023","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2023\/01\/nascio-top-10-for-2023\/","title":{"rendered":"Breaking Down the NASCIO Top 10 for 2023"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The National Association of State Chief Information Officers (NASCIO) recently released its annual<\/span><a href=\"https:\/\/www.nascio.org\/wp-content\/uploads\/2022\/12\/NASCIO_CIOTopTenPriorities_2023.pdf\" rel=\"noopener\"> <span style=\"font-weight: 400;\">State CIO Top 10 Priorities for 2023<\/span><\/a><span style=\"font-weight: 400;\"> survey results. This survey asks 51 state and territory CIOs to rank their top policy and technology priorities for the coming year.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It should come as no surprise that cybersecurity is, once again, priority #1 for state CIOs. Why? Perhaps it\u2019s because none of the other initiatives on the list (not even hybrid work, legacy modernization or cloud adoption) can succeed without a solid cybersecurity foundation. In fact, cybersecurity directly affects most, if not all, of the nine other priorities on this year\u2019s NASCIO Top 10 list.\u00a0<\/span><\/p>\n<h3><strong>Priority #1: Cybersecurity<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Cybersecurity has held the #1 spot on the NASCIO Top 10 list for the last 10 years. In the last few years, we\u2019ve seen a shift in cyberthreats from state-sponsored threat actors to the rise of well-funded, highly motivated private organizations. And, they\u2019re innovating faster than ever before. But, it is possible to beat them at their own game, no matter how quickly they move. With the Palo Alto Networks platform approach to building and operating a modernized, future-proof security framework, you can integrate cybersecurity into every initiative to protect data and ensure continuity of services.<\/span><\/p>\n<h3><strong>Priority #2: Digital Government\/Digital Services<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Having a consistent cybersecurity posture is now more important than ever. Most state and local government agencies have a patchwork of nonintegrated, siloed security solutions of various maturity levels across their business networks, endpoints and clouds. But, with data traveling across the IT landscape, it is critical to implement consistent security configurations across your on-premises, cloud and SASE environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That consistent security posture should be inclusive of any initiatives around modernization, consolidation or digital government\/digital services. Palo Alto Networks takes a holistic approach to cybersecurity across the organization. Instead of applying unique security controls to every new project, you can ensure the same rigorous levels of security everywhere.<\/span><\/p>\n<h3><strong>Priority #3: Workforce<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-09-13-gartner-survey-reveals-talent-shortages-as-biggest-barrier-to-emerging-technologies-adoption\" rel=\"noopener\"><span style=\"font-weight: 400;\">Gartner<\/span><\/a><span style=\"font-weight: 400;\">, a lack of skilled talent is the greatest barrier to the adoption of emerging technologies. Gartner even goes so far as to say that the cloud skills gap in particular, \u201chas reached a crisis level in many organizations.\u201d In cybersecurity specifically, unfilled positions <\/span><a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" rel=\"noopener\"><span style=\"font-weight: 400;\">have increased 350% since 2013<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Building a talent pipeline is important for state and local government agencies to overcome the IT skills gap, particularly in cybersecurity. Through our<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/services\/education\/academy\" rel=\"noopener\"> <span style=\"font-weight: 400;\">Cybersecurity Academy<\/span><\/a><span style=\"font-weight: 400;\">, we work with educational institutions from high school through college to create a pipeline of cybersecurity talent for the future. Students can take courses on everything, from cybersecurity fundamentals to operating a security operations center.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, automation will also help state and local agencies navigate around the skills gap by harnessing AI and machine learning to protect against an increasing volume of automated attacks. Automation levels the playing field, making cybersecurity more effective and boosting morale. Last month, at\u00a0<\/span><a href=\"https:\/\/reg.ignite.paloaltonetworks.com\/flow\/paloaltonetworks\/ignite22\/start\/page\/main\"><span style=\"font-weight: 400;\">Ignite \u201922<\/span><\/a><span style=\"font-weight: 400;\"> in Las Vegas, we heard from the<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/customers\/northdakotasoc\"> <span style=\"font-weight: 400;\">State of North Dakota<\/span><\/a><span style=\"font-weight: 400;\"> about how they were able to automate 99.999999% of alerts, which enables them to both attract and retain top cybersecurity talent.<\/span><\/p>\n<h3><strong>Priority #4: Legacy Modernization<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Legacy modernization shouldn\u2019t require you to sacrifice your security posture. Palo Alto Networks enables you to keep your legacy systems secure while you plan and complete migrations. Cortex XDR protects legacy Windows, Windows Server, MacOS and Linux systems. And when you apply a Zero Trust strategy in your legacy environment, you can ensure that you\u2019re following the principles of least-privilege to limit access to those specific resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After you\u2019ve modernized, the Palo Alto Networks security posture also uses modern and next-generation security controls to help keep your modernized systems safe. Modernized applications generally take advantage of cloud-native deployment methods and APIs, and they are deployed in a way that is more accessible to the end user.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks provides security controls that take advantage of these technologies to better secure your modern applications. With containerized NGFWs, cloud-native API security (more in #6), and an industry leading SASE solution, you can rest assured that your modern applications will have the robust security posture that you've built out for the rest of your environment.<\/span><\/p>\n<h3><strong>Priority #5: Identity and Access Management<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Spoofing an individual\u2019s identity is a leading way for cybercriminals to circumvent security controls in your environment. Multi-factor authentication (MFA) is critical. But, even if your systems don\u2019t support MFA, Palo Alto Networks can serve as your IAM enforcement point before access to the system is even granted, essentially positioning MFA upstream of your applications.<\/span><\/p>\n<h3><strong>Priority #6: Cloud Services<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Today, hybrid, multi-cloud is the norm. Most organizations don\u2019t standardize on just one cloud. Why pick just one cloud? There are business benefits to retaining the flexibility of running your applications and workloads in the best cloud for the job. However, you still need consistent cybersecurity controls across all your various cloud environments.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This drives the need for a cloud-native application protection platform (CNAPP) that provides consistent security across major cloud service providers. In Palo Alto Networks language, that\u2019s<\/span>\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\/cnapp-5-must-have?utm_source=google-jg-amer-prisma_cloud&amp;utm_medium=paid_search&amp;utm_term=prisma%20cloud&amp;utm_campaign=google-prisma_cloud-cnapp-amer-multi-lead_gen-en&amp;utm_content=gs-16994480386-136033040579-635091330195&amp;sfdcid=7014u000001NbG8AAK&amp;gclid=Cj0KCQiAtvSdBhD0ARIsAPf8oNkht4SEiFr2D4Plt97KJd8y42N9Vp-ew25jvO1jRm9a5dPU86pozpEaAkxSEALw_wcB\"><span style=\"font-weight: 400;\">Prisma Cloud<\/span><\/a><span style=\"font-weight: 400;\">, our comprehensive cloud-native security platform.<\/span><\/p>\n<h3><strong>Priority #7: Consolidation\/Optimization<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks is continuing to have more conversations with customers around consolidation. As our CEO Nikesh Arora recently told <\/span><a href=\"https:\/\/www.cnbc.com\/2022\/11\/18\/palo-alto-networks-ceo-cost-cutting-customers-are-coming-to-us-in-tough-economy.html\" rel=\"noopener\"><span style=\"font-weight: 400;\">Mad Money\u2019s Jim Cramer<\/span><\/a><span style=\"font-weight: 400;\">, \u201cSuddenly, the number one priority, in addition to being secure is: \u2018Can you help me do that without increasing costs?\u2019\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By consolidating and simplifying their security postures, organizations can shore up their cybersecurity while reducing their spending on disparate point solutions. Remember the State of North Dakota? In addition to achieving incredible levels of automation, they were able to <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/assets\/pdf\/customers\/northdakotasoc.pdf\"><span style=\"font-weight: 400;\">save <\/span><span style=\"font-weight: 400;\">$200,000<\/span><\/a><span style=\"font-weight: 400;\"> per year from high-priority analysis and threat remediation<\/span><span style=\"font-weight: 400;\"> alone.<\/span><\/p>\n<h3><strong>Priority #8: Data and Information Management<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Managing data and information has always been a key focus for many organizations, and it will remain an important priority going into 2023. Data loss prevention (DLP) is a critical element of data management, and keeping sensitive data safe and private is more challenging than ever.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Implementing a DLP solution that enforces consistent policies across SASE, on-premises and cloud environments makes DLP easier. The Palo Alto Networks DLP solution provides a centralized DLP dashboard that allows you to deliver data privacy and compliance consistently across your IT landscape.<\/span><\/p>\n<h3><strong>Priority #9: Broadband\/Wireless Connectivity<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">When we say, \u201cconsistent security across all environments,\u201d we mean <\/span><i><span style=\"font-weight: 400;\">all<\/span><\/i><span style=\"font-weight: 400;\"> environments. With state CIOs focused on strengthening statewide connectivity, expanding rural broadband and deploying 5G, mobile users and devices are more at risk than ever. Palo Alto Networks offers solutions, such as our ML-Powered NGFW for 5G. It is specifically designed to identify infected devices and block known exploits, malware, malicious URLs and spyware in 5G environments. And, we are continuing to strengthen our\u00a0<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/5g-security-for-enterprises\"><span style=\"font-weight: 400;\">5G security offerings<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><strong>Priority #10: Customer Relationship Management<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Although this is not directly related to a product we sell, many organizations utilize the data they collect from their network, endpoint or cloud security posture to ensure they are meeting their SLAs for security. Palo Alto Networks provides reporting and dashboard capabilities across our products to help your IT and security operations teams understand where improvements need to be made.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, in the Palo Alto Networks security operations center (SOC), our SOC team secures more than 8,000 employees, 20,000 endpoints and 13 data centers against roughly 500 billion threat events per month.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After modernizing our approach to security operations, we\u2019ve seen significant improvements. Detecting and remediating malicious emails used to take around 30 minutes, now it takes 10 seconds. You can <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/SOC-Automation-Tour\"><span style=\"font-weight: 400;\">sign up for a SOC tour<\/span><\/a><span style=\"font-weight: 400;\"> to learn more about what we do in-house to protect the world\u2019s largest cybersecurity company.<\/span><\/p>\n<h2><strong>Palo Alto Networks Is 10 for 10<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Taking a platform approach to your cybersecurity initiatives is a great first step to addressing many of these concerns through a holistic approach that enables consistency. See why so many <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/why-paloaltonetworks\"><span style=\"font-weight: 400;\">customers choose Palo Alto Networks<\/span><\/a><span style=\"font-weight: 400;\"> as their cybersecurity partner of choice. For more information, visit our<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/security-for\/government\/state-and-local-government\"> <span style=\"font-weight: 400;\">state and local government<\/span><\/a><span style=\"font-weight: 400;\"> website, or contact your Palo Alto Networks representative.\u00a0\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity has held the #1 spot on the NASCIO Top 10 list for 10 years, shifting from state-sponsored threat actors to well-funded private organizations.<\/p>\n","protected":false},"author":723,"featured_media":178452,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724,6769],"tags":[4491,123,759,8206],"coauthors":[8700],"class_list":["post-178451","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","category-public-sector","tag-cloud-service","tag-government2","tag-nascio","tag-security-posture"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/01\/Co-workers-at-Window-LI.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/178451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=178451"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/178451\/revisions"}],"predecessor-version":[{"id":178660,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/178451\/revisions\/178660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/178452"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=178451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=178451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=178451"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=178451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}