| Line 69: | Line 69: | 
|  | * Compute and Storage Services Security (CSS) |  | * Compute and Storage Services Security (CSS) | 
|  | For more information about the ESA program areas of focus, please read the [http://www.gcpedia.gc.ca/gcwiki/images/1/17/GC_ESA_Vision_and_Strategy.pdf GC ESA Vision and Strategy] document. |  | For more information about the ESA program areas of focus, please read the [http://www.gcpedia.gc.ca/gcwiki/images/1/17/GC_ESA_Vision_and_Strategy.pdf GC ESA Vision and Strategy] document. | 
|  | + |  | 
|  | + | <br> | 
|  | + | == Benefits and Risks of the GC ESA Program == | 
|  | + | Implementation of the GC IT security strategy, including the GC ESA program, will result in many benefits, including: | 
|  | + | * Enhanced security posture throughout the GC; | 
|  | + | * Better awareness of threats to GC IT infrastructure;  | 
|  | + | * Improved understanding of the motivations and techniques of adversaries; | 
|  | + | * Increased abilities to provide rapid response to IT security incidents affecting GC systems; | 
|  | + | * Better positioned to acquire and share cyber threat information from/with trusted partners; and | 
|  | + | * Enhanced level of confidence with users, citizens, allies and other levels of government. | 
|  | + | However, while the benefits are substantial, the GC IT security strategy is not without any risks, including: | 
|  | + | * Culture shift, | 
|  | + | * Costs, | 
|  | + | * Achieving balanced results, | 
|  | + | * Long-term commitment, | 
|  | + | * Technology advancements, | 
|  | + | * Technology limitations, and | 
|  | + | * Insufficient resources. | 
|  | + | For a more detailed explanation of the benefits and risks of the GC IT security strategy and ESA program, please read the [http://www.gcpedia.gc.ca/gcwiki/images/1/17/GC_ESA_Vision_and_Strategy.pdf GC ESA Program Vision and Strategy] document.   | 
|  |  |  |  | 
|  | <br> |  | <br> |