![](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
20 мин.
![](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
Vermont’s new CISO shares his proactive approach to cyber Priorities Podcast
-
- Новости
John Toney, Vermont's new chief information security officer, starts his day with threat intelligence briefs — reading, watching or listening to the latest cybersecurity news.
Toney, a former Secret Service special agent, joined Vermont's Agency of Digital Services last month, at a time when more sophisticated cyberattacks against state and local governments across the United States are on the rise, especially from foreign cybercriminals targeting critical infrastructure in rural communities, such as water facilities.
This week, Toney spoke with StateScoop reporter Sophia Fox-Sowell about some of the projects he's working on, including compliance and procurement. He also emphasized the importance of staying up to date with threat intelligence news and the need for proactive measures to address these growing cyber threats, including identifying vulnerabilities with regular scans, improving security protocols, and reducing operational redundancies through automation.
John Toney, Vermont's new chief information security officer, starts his day with threat intelligence briefs — reading, watching or listening to the latest cybersecurity news.
Toney, a former Secret Service special agent, joined Vermont's Agency of Digital Services last month, at a time when more sophisticated cyberattacks against state and local governments across the United States are on the rise, especially from foreign cybercriminals targeting critical infrastructure in rural communities, such as water facilities.
This week, Toney spoke with StateScoop reporter Sophia Fox-Sowell about some of the projects he's working on, including compliance and procurement. He also emphasized the importance of staying up to date with threat intelligence news and the need for proactive measures to address these growing cyber threats, including identifying vulnerabilities with regular scans, improving security protocols, and reducing operational redundancies through automation.
20 мин.