NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
December 15, 2022

Transformative Leaders Are the Key to Success in SLED Cybersecurity – Get the Full Report

NuHarbor Security

We spent the past year surveying senior leaders, analysts, and experts, identifying trends and successes that are defining a new generation of cybersecurity visionaries within the SLED community.

During this research, it was clear that the characteristic that defines the most successful security programs is the evolution and continuing efforts of a forward-thinking security or IT leader. The challenges these women and men regularly navigate involve a volume of end users that outstrips any private corporation, no matter how large. They’re bound by law, not by profit, and often hampered by time-constrained spending and election cycles.

It was also clear that these decision-makers weren’t feeling heard in discussions of strategies and trends within their own organizations. They felt like an afterthought in security industry reporting and weren’t recognized for their needs. In response to this gap, we created the 2022 Cybersecurity Priorities Report (CPR), to highlight SLED advancements, challenges, and leaders, and to circulate their advice and strategies.

Download the report to learn how successful SLED leaders have recognized and addressed these key topics:

Emphasis on Zero Trust Architecture

SLED leaders have recognized that zero trust is a core element of supporting remote workforces while addressing the increased virality of cyberattacks and the risk of public exposure. Learn how other SLED organizations have designed, justified, and delivered on zero trust strategies, and what benefits they’ve seen.

Cybersecurity Collaboration Is Evolving

SLED organizations have a rare willingness to share information and collaborate with their peers. While information sharing organizations exist, our research shows they don’t provide enough of the information that SLED security leaders need, and often focus on threat intelligence and detection, not delivering actionable information and recommendations that are of the most benefit. The recent influx of available funding from the federal government is leading to the development of broader initiatives and partnerships that will drive better collaboration, while tighter relationships among SLED leaders are increasing the frequency and value of such cooperation. Learn what this may mean for your own approach to working together, and how these resources can bolster your organization’s security posture and capabilities.

Application Security in the Public Sector

Improving application security is unlike other security or IT efforts because it involves more than just applying new technical controls, training users, or detecting and blocking visible attacks. It requires new thought processes from organizational leaders who are accustomed to acquiring or developing applications to solve immediate problems. The SLED CPR examines the causes and impacts of the current struggles with application security, giving recommendations and specific SLED examples of innovations in all phases of application acquisition, from vendor requirements, to contract terms, to testing and application certification.

Cyber Resilience Early Warning System (CREWS)

Learn about CREWS, the latest structured approach to information sharing, particularly focused on threat intelligence and defensive recommendations. CREWS is short for Cyber Resilience Early Warning System. More than a reactive tool for threat hunters searching out IOCs, CREWS is built to deliver both the identifiable characteristics of an active threat and specific recommendations for how to avoid falling victim to that new threat in the first place.

Threats and Actors

Our research shows that specific threat actors and attack types are appearing with more frequency in the SLED community. Successful teams focus on the threat vectors exercised by these attackers to identify gaps and areas suited to practical risk mitigation, regardless of the source and motivation of the attack. Learn how we identify and examine bad actors, how to leverage known threats, and how to plan for the next emerging bad actors.

Read the full 2022 Cybersecurity Priorities Report today.

New call-to-action

Included Topics

  • Industry Insights,
  • NuHarbor

Related Posts

Industry Insights 2 min read
New Insights From the 2023-2024 SLED Cybersecurity Priorities Report
Read More
1 min read
Breach of the Week – Shocked and Amazed Read More
Advisory and Planning 2 min read
A Security Roadmap Isn’t What to Buy. It’s How to Think
A Security Roadmap Isn’t What to Buy. It’s How to Think
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.