Security Matters

One-on-One with OPM Chief Information Security Officer

One-on-One with OPM Chief Information Security Officer

Cord Chase, Chief Information Security Officer at the Office of Personnel Management, discusses cybersecurity strategy and goals of his office...
House committee approves surveillance reauthorization bill

House committee approves surveillance reauthorization bill

Jimmy Koo, senior legal editor for Bloomberg Law, discusses a decision by the House Judiciary Committee to reauthorize Section 702...
Common threads to international cyber diplomacy

Common threads to international cyber diplomacy

Christopher Painter, former coordinator for cyber issues at the State Department, discusses the importance of international cyber diplomacy.
IG report finds OPM still struggling with cyber

IG report finds OPM still struggling with cyber

Michael Esser, assistant inspector general for audits at the Office of Personnel Management, discusses the findings of their Federal Information...
Hundreds attend federal cyber & tech hiring fair

Hundreds attend federal cyber & tech hiring fair

NextGov Cybersecurity correspondent Joseph Marks discusses a handful of headlines from this week, including the government first ever cyber hiring...
Securing federal information systems & personally identifiable info

Securing federal information systems & personally identifiable info

Phyllis Schneck, managing director and global leader for cyber solutions at Promontory, discusses the evolving threat landscape and the high...
Cybersecurity priorities at the Health & Human Services Department

Cybersecurity priorities at the Health & Human Services Department

At the 2017 ACT-IAC Executive Leadership Conference Christopher Wlaschin, chief information security officer at the Health & Human Services Department,...
Kaspersky & the future of government cybersecurity

Kaspersky & the future of government cybersecurity

James Norton, founder and president at Play-Action Strategies, and Sean Kanuck, director of future conflict and cybersecurity at the International...
Defining a cyber moonshot

Defining a cyber moonshot

Gus Hunt, leader of the cybersecurity practice at Accenture Federal Services, discusses the five things federal agencies can do now...
DHS efforts bringing private sector innovation to government cyber

DHS efforts bringing private sector innovation to government cyber

Chris Cummiskey, CEO of Cummiskey Strategic Solutions and former acting undersecretary at the Department of Homeland Security, discusses how DHS...
The growth of artificial intelligence in cybersecurity

The growth of artificial intelligence in cybersecurity

Tony Hubbard, principal of cybersecurity services at KPMG, discusses the use of AI in the cyber realm — who’s using...
DHS orders agencies to implement email, website encryption tools

DHS orders agencies to implement email, website encryption tools

Joseph Marks, cybersecurity correspondent at NextGov, discusses the Department of Homeland Security’s Monday directive to agencies to implement new security...
Administration, agencies focus on cyber information sharing

Administration, agencies focus on cyber information sharing

Brig. Gen. Gregory Touhill (USAF, ret.), president of Cyxtera Federal Group, discusses cyber information sharing between industry and government.
Priorities for Army cyber and electronic warfare

Priorities for Army cyber and electronic warfare

Maj. Gen. John Morrison, commander of the Army Cyber Center of Excellence and Fort Gordon, discusses the Army’s evolving cyber...
Mission of ICE’s Homeland Security Investigations Office

Mission of ICE’s Homeland Security Investigations Office

Patricia Cogswell, assistant director of homeland security investigations in the Office of Intelligence at U.S. Immigration and Customs Enforcement, discusses...
Defense Department’s top cybersecurity priorities

Defense Department’s top cybersecurity priorities

Essye Miller, deputy chief information officer for cybersecurity at the Department of Defense, discusses efforts to build and maintain DoD’s...
Kaspersky software ordered off all government computers

Kaspersky software ordered off all government computers

Greg Otto, managing editor for CyberScoop, discusses the Homeland Security Department’s decision to order all federal agencies to stop using...
Oversight efforts in the Intelligence Community

Oversight efforts in the Intelligence Community

John Johanson, assistant inspector general for investigations in the Office of Inspector General of the Intelligence Community, discusses the unique...
The future of AI in federal cybersecurity

The future of AI in federal cybersecurity

Ari Schwartz, managing director of cybersecurity services for Venable, and Sam Curry, chief security officer for Cybereason, discuss some of...
Risks of centralizing government cybersecurity

Risks of centralizing government cybersecurity

Phyllis Schneck, former deputy undersecretary for cybersecurity and communications at the Department of Homeland Security, discusses the push at some...
Obama’s cyber czar calls for ‘a mix’ of centralized security

Obama’s cyber czar calls for ‘a mix’ of centralized security

Michael Daniel, president of the Cyber Threat Alliance and former White House cybersecurity coordinator, discusses the state of cyber collaboration...
CIA looks to private sector, Silicon Valley for innovation

CIA looks to private sector, Silicon Valley for innovation

Dawn Meyerriecks, deputy director for science and technology at the CIA, discusses where her agency is looking for innovative solutions...
Goals of Navy’s new digital warfare office

Goals of Navy’s new digital warfare office

Vice Adm. Jan Tighe, deputy chief of naval operations for information warfare and the director of naval intelligence, discusses how...
Status of the government security clearance backlog

Status of the government security clearance backlog

Beth McGrath, managing director at Deloitte, discusses how the adoption of new technologies could impact the security clearance process at...
Agencies start feeling the impact of connected cars

Agencies start feeling the impact of connected cars

Dave Wise, director of physical infrastructure issues at the Government Accountability Office, discusses the privacy implications of connected cars for...
Agencies’ approach to cyber forensics and recovery

Agencies’ approach to cyber forensics and recovery

Steve Bongardt, president of the Gyges Group, discusses the timeline of the investigation into the 2015 hack of the Office...
Cross-agency team honored for Medicare fraud investigation

Cross-agency team honored for Medicare fraud investigation

Kevin Nalu, special agent for criminal investigation at the IRS, discusses the work that earned him and three other colleagues...
The current state of cybersecurity at OPM

The current state of cybersecurity at OPM

David DeVries, chief information officer at the Office of Personnel Management, discusses the current state of cybersecurity at OPM, the...
Are arcane budget rules threatening government cybersecurity?

Are arcane budget rules threatening government cybersecurity?

Joseph Marks, cybersecurity correspondent for NextGov, discusses the budget rules and processes that could be impacting the governments cybersecurity.
Searching for a solution to the security clearance backlog

Searching for a solution to the security clearance backlog

David Berteau, president & CEO of the Professional Services Council, discusses the National Background Investigation Bureau’s effort to reduce the...
Assessing OPM data security in years after massive breach

Assessing OPM data security in years after massive breach

Lewis Parker, deputy assistant inspector general for audits at the Office of Personnel Management, discusses the Office of Inspectors General...
OMB satisfied with cybersecurity EO compliance

OMB satisfied with cybersecurity EO compliance

President Trump’s cybersecurity executive order called for agency heads to create a risk management report within 90 days — using the...
Crafting a successful federal cyber recipe

Crafting a successful federal cyber recipe

Brig. Gen. Gregory Touhill, president of Cyxtera Federal Group and former U.S. chief information security officer, discusses how defense and...
An enterprise risk management approach to cybersecurity

An enterprise risk management approach to cybersecurity

Richard Spires, CEO of Learning Tree International, discusses the emerging role of enterprise risk management in maintaining the safety of...
RSA Addressing Identity Risk

RSA Addressing Identity Risk

Sponsored: The Department of Defense is planning for the future of identity management and a new discipline is emerging. It’s...
House DHS authorization bill contains significant cyber provisions

House DHS authorization bill contains significant cyber provisions

Ron Marks, chair of the intelligence program at the Daniel Morgan Graduate School of National Security, discusses cybersecurity reforms contained...
NIST guidance prioritizes risk assessment

NIST guidance prioritizes risk assessment

John Banghart, senior director of technology risk management at Venable, and Rob Knake, senior fellow at the Council on Foreign Relations,...
DHS’ role in securing the next U.S. election

DHS’ role in securing the next U.S. election

Rear Adm. Jamie Barnett (USN, ret.), a partner is Venable’s cybersecurity practice, discussed the path forward after a recent Intelligence Community...
Four possible agency responses to the DATA Act

Four possible agency responses to the DATA Act

Hudson Hollister, executive director of the Data Coalition, explained the different agency responses to this spring’s DATA Act deadline — non-compliance,...
House version of NDAA seeks DoD cyber improvements

House version of NDAA seeks DoD cyber improvements

Maria Horton, founder and CEO of EmeSec, discusses changes to U.S. cyber strategy as lawmakers in both the House and...
White House officials talk cybersecurity with world leaders

White House officials talk cybersecurity with world leaders

Tim Starks, cybersecurity reporter at Politico, discusses international meetings this week being attended by Homeland Security Secretary John Kelly and...
NIST seeking solutions to grow the cyber workforce

NIST seeking solutions to grow the cyber workforce

Rodney Petersen, director of NIST’s National Initiative for Cybersecurity Education, discusses the work NICE is doing to help bolster the...
Building a government-wide cybersecurity strategy

Building a government-wide cybersecurity strategy

Phyllis Schneck, managing director & global leader of cyber solutions at Promontory and former deputy undersecretary for cybersecurity and communications...
Policy and cultural concerns about cloud-based cyber security

Policy and cultural concerns about cloud-based cyber security

Robert Bigman, founder of 2BSecure and former Chief Information Security Officer at the CIA, discusses a major exposure of voter...
Taking charge of the federal cyber landscape

Taking charge of the federal cyber landscape

Ronald Marks, chair of the Intelligence Program at the Daniel Morgan Graduate School of National Security, discuss how agencies should...
Cybersecurity priorities at FEMA

Cybersecurity priorities at FEMA

Adrian Gardner, CIO at FEMA, discusses the work his agency is doing to comply with the White House’s cybersecurity executive...
Federal agencies seek to improve cyber posture

Federal agencies seek to improve cyber posture

Kevin Kelly, CEO at LGS Innovations and Wayne Lewandowski, area vice president of Federal at Thales e-Security, discuss the impact...
How open source is changing the IC

How open source is changing the IC

Lt. Gen. Mary Legere (USA, ret.), managing director for the national and defense intelligence business at Accenture, discussed the proliferation...
Mapping an approach to cyber procurement

Mapping an approach to cyber procurement

Chris Cummiskey, CEO of Cummiskey Strategic Solutions and former acting undersecretary at the Department of Homeland Security, discussed cyber procurement...
Bridging the gap between compliance and security

Bridging the gap between compliance and security

Ira Hobbs, former deputy assistant secretary for IT at the Treasury Department, discussed what agencies can do to get a...
NOAA CIO: “Our vision is about agile”

NOAA CIO: “Our vision is about agile”

The National Oceanic and Atmospheric Administration has a slew of IT projects advancing simultaneously. Today, the agency is both a...
DOE seeks new maturity model for information security

DOE seeks new maturity model for information security

Kathleen Tighe, inspector general at the Department of Education, discussed vulnerabilities in DOE’s information security programs.
Comey firing & the cybersecurity leadership gap at federal agencies

Comey firing & the cybersecurity leadership gap at federal agencies

Nafeesa Syeed, national security and cyber reporter at Bloomberg, discussed the firing of FBI director James Comey and its impact...
Agencies await management agenda from the White House

Agencies await management agenda from the White House

Robert Shea, principal at Grant Thornton, discussed clues to President Trump’s management agenda buried in his executive order on cybersecurity.
FTC team builds IdentityTheft.gov to help consumers

FTC team builds IdentityTheft.gov to help consumers

Nat Wood, associate director of Consumer & Business Education at the Federal Trade Commission, discusses his teams’ work designing and...
White House issues cybersecurity executive order

White House issues cybersecurity executive order

Maria Horton, president and CEO at EmeSec, discusses how agencies should be implementing the White House’s new cybersecurity executive order.
Cybersecurity executive order aimed at federal networks, infrastructure

Cybersecurity executive order aimed at federal networks, infrastructure

Gregory Touhill (USAF, Ret.), former U.S. Chief Information Security Officer and recipient of the 2017 (ISC)² F. Lynn McNulty GISLA...
President Trump signs cybersecurity executive order

President Trump signs cybersecurity executive order

On Thursday, President Trump signed an executive order titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” The order...
DHS releases study on mobile device security

DHS releases study on mobile device security

Vincent Sritapan, program manager for the Homeland Security Advanced Research Projects Agency at DHS, discusses the agency’s latest study of...
What’s in a name? For NPPD, a new one could reflect changing priorities

What’s in a name? For NPPD, a new one could reflect changing priorities

Phyllis Schneck, managing director of cyber solutions at Promontory Financial Group and former deputy undersecretary for cybersecurity at the Department...
Systems engineering of cyber resilient and secure weapons

Systems engineering of cyber resilient and secure weapons

Linnie Haynesworth, general manager of cyber solutions at Northrop Grumman, discusses Defense Department’s new strategies for cyber resilient and secure...
Agencies grapple with shadow I.T. problem

Agencies grapple with shadow I.T. problem

Robert Bigman, president of 2BSecure, discusses how the federal government is grappling with it’s growing shadow I.T. problem.
Agencies await cybersecurity guidance from the White House

Agencies await cybersecurity guidance from the White House

Tony Hubbard, principal of cybersecurity services at KPMG, discussed the ways agencies are improving their cyber defense.
GSA working with DHS to streamline cyber procurement

GSA working with DHS to streamline cyber procurement

The General Services Administration is looking to streamline the way agencies are buying cyber solutions. Now, they will have access...
NIST looking for some fresh thinking in latest cyber framework

NIST looking for some fresh thinking in latest cyber framework

Comments on the next iteration of NIST’s cybersecurity framework are due on April 10th. It’s a landmark document with national...
The intelligence community & open source

The intelligence community & open source

Maj. Gen. Dale Meyerrose (USAF, ret.), president of the Meyerrose Group, discussed how open source technology is changing the way...
Making sense of agencies’ cyber priorities

Making sense of agencies’ cyber priorities

Ari Schwartz, managing director of cybersecurity services at Venable and former senior director of cybersecurity at the White House, discussed...
Spy powers at risk amid Trump controversy

Spy powers at risk amid Trump controversy

Sean Carberry, defense reporter at FCW, discusses the future of surveillance powers amid controversy surrounding the White House.
White House prioritizes cyber in FY18 budget outline

White House prioritizes cyber in FY18 budget outline

Ronald Marks, chair of the Intelligence Program at the Daniel Morgan Graduate School of National Security, discusses where the Trump...
Cybersecurity challenges at the Transportation Security Administration

Cybersecurity challenges at the Transportation Security Administration

Paul Morris, acting chief information security officer at the Transportation Security Administration, discusses the major cybersecurity challenges he’s facing and...
New cyber mandate for government contractors

New cyber mandate for government contractors

Maria Horton, president and CEO of EmeSec, discusses the new privacy and cybersecurity mandates for contractors.
State Department CIO targeting cloud, artificial intelligence

State Department CIO targeting cloud, artificial intelligence

State Department chief information officer Frontis Wiggins discussed the push to cut costs at the agency, reduce duplicative IT, and...
VA seeks greater collaboration between business and IT

VA seeks greater collaboration between business and IT

Rob Thomas, chief information officer at the Department of Veterans Affairs, detailed his effort to stand up an IT demand...
OMB: Federal agencies are doing a better job at securing their networks

OMB: Federal agencies are doing a better job at securing their networks

Rear Adm. Jamie Barnett (USN, ret.), partner in the cybersecurity practice at Venable, discussed the results of this year’s FISMA...
NSA opens some software and code to the public

NSA opens some software and code to the public

Linda Burger, director of the Technology Transfer Program at the National Security Agency, discusses why NSA is opening some of...
Implications of Wikileaks’ CIA documents dump

Implications of Wikileaks’ CIA documents dump

Robert Bigman, founder of 2BSecure and former chief information security officer at the CIA, and Ronald Marks, senior fellow at...
Insider threats continue to plague federal agencies

Insider threats continue to plague federal agencies

Insider threats continue to plague federal agencies Karen Evans, national director of the U.S. Cyber Challenge and former administrator of...
SEC moves toward Inline XBRL filings

SEC moves toward Inline XBRL filings

Data Coalition founder Hudson Hollister discussed how this month’s Securities and Exchange Commission vote moving toward Inline XBRL filings could...
Forecasting the future of U.S. Cyber Command

Forecasting the future of U.S. Cyber Command

Rear Adm. Danelle Barrett, deputy director of current operations at U.S. Cyber Command, discussed the implications of elevating Cybercom to...
Takeaways from the RSA Conference

Takeaways from the RSA Conference

Bob Gourley, a partner at Cognitio and former chief technology officer at the Defense Intelligence Agency, discussed his primary takeaways...
The importance of personnel to national cybersecurity

The importance of personnel to national cybersecurity

Earl Crane, CEO of Emergent Network Defense and former White House director of federal cybersecurity policy, discussed an op-ed he...
Report: DHS makes progress in high-risk update

Report: DHS makes progress in high-risk update

Rebecca Gambler, director of Homeland Security and Justice Issues at the Government Accountability Office, discusses the agency’s progress in moving...
The future of U.S. Cyber Command

The future of U.S. Cyber Command

Michèle Flournoy, CEO at the Center for a New American Security and former under secretary of defense for policy. They...
U.S. Army Cyber Command’s Lt. Gen. Paul Nakasone from the RSA Conference

U.S. Army Cyber Command’s Lt. Gen. Paul Nakasone from the RSA Conference

Government Matters’ Francis Rose traveled to RSA and sat down with U.S. Army Cyber Command’s Lt. Gen. Paul Nakasone. They discussed budget...
The cyber culture inside DoD

The cyber culture inside DoD

Francis sat down with Marianne Bailey, deputy chief information officer for cybersecurity at the Department of Defense. They discussed the...
Event Spotlight: RSA Conference Public Sector Day

Event Spotlight: RSA Conference Public Sector Day

While many important conversations happen here in DC, the RSA Conference in San Francisco is where the world talks security....
Trump memo reorganizes National Security Council

Trump memo reorganizes National Security Council

Loren DeJonge Schulman, deputy director of studies at the Center for a New American Security, and James Carafano, vice president...
Impact of federal hiring freeze on national security

Impact of federal hiring freeze on national security

Richard Spires, CEO at Learning Tree International, discusses how CIOs in government can navigate the federal hiring freeze and work...
Trump delays signing of cybersecurity executive order

Trump delays signing of cybersecurity executive order

Mike Hettinger, president of Hettinger Strategy Group and Rich Beutel, principal at Cyrrus Analytics, discuss the details known so far...
OMB issues cybersecurity guidance to agencies

OMB issues cybersecurity guidance to agencies

Ari Schwartz, managing director of cybersecurity services at Venable and former director of cybersecurity at the White House, discusses OMB’s...
RSA Securing the Federal Mission

RSA Securing the Federal Mission

Sponsored: Cyber attacks on the federal government. How will security evolve? Steve Schmalz, Federal CTO for RSA discusses the issues facing...
Unclassified GEOINT is shaping the NGA enterprise

Unclassified GEOINT is shaping the NGA enterprise

There’s a relatively new spinoff inside the National Geospatial-Intelligence Agency called Pathfinder. The program is a GEOINT swat team of...
The concept of counter-GEOINT

The concept of counter-GEOINT

As the National Geospatial-Intelligence Agency tries to perfect the ratio between public-facing and top-secret GEOINT, they need to factor in...
NGA and GEOINT discipline at a flex point

NGA and GEOINT discipline at a flex point

The National Geospatial-Intelligence Agency is a unique organization guided by both the Department of Defense and the Director of National...
The Obama administration’s cyber legacy

The Obama administration’s cyber legacy

Joseph Marks, cybersecurity correspondent at NextGov, discusses the good and the bad of the Obama administration’s cyber legacy.
Trump administration seeks beefed up cyber presence

Trump administration seeks beefed up cyber presence

Rear Adm. Jamie Barnett (USN, ret.), partner in Venable’s cybersecurity practice, discussed the people tapped as cyber advisors to President-elect...
Trump administration’s 90-day cyber plan

Trump administration’s 90-day cyber plan

Maria Horton, president and CEO at Emesec, discusses President-Elect Trump’s call for a 90-day plan to stop or slow cyber...
Trump calls for cyber plan in first 90 days

Trump calls for cyber plan in first 90 days

Tony Cole, vice president and global government chief technology officer at FireEye, discusses government “cyber hygiene” and how it can...
How agencies can come to terms with the certainty that they will be hacked

How agencies can come to terms with the certainty that they will be hacked

Coalfire’s Dave McClure discussed how agencies can come to terms with the certainty that they will be hacked.
Two cyber experts among list of Trump’s federal landing teams

Two cyber experts among list of Trump’s federal landing teams

Joseph Marks, cybersecurity correspondent for NextGov, discusses the two cyber experts appointed to President Elect Trump’s landing team.
Implications of double and triple wait times for background check investigations at OPM

Implications of double and triple wait times for background check investigations at OPM

Beth McGrath, director of Deloitte Consulting’s federal sector, discussed the implications of double and triple wait times for background check...
Trump administration and intelligence briefings

Trump administration and intelligence briefings

Gen. Michael Hayden (USAF, ret.), former director of both the National Security Agency and the CIA, discussed intelligence briefings being...
Recommendations from the Commission on Enhancing National Cybersecurity

Recommendations from the Commission on Enhancing National Cybersecurity

Robert Bigman, founder of 2BSecure and former chief information security officer at the CIA, discussed pending recommendations from the Commission...
CIOs push for power to stop cyber-deficient contracts

CIOs push for power to stop cyber-deficient contracts

Robert Klopp, CIO at the Social Security Administration, discusses CIO  cybersecurity and acquisition authority at federal agencies.
NIST releases new cybersecurity guidelines

NIST releases new cybersecurity guidelines

Ron Ross, fellow at the National Institute of Standards and Technology, discussed 800-160 — NIST’s newly-released cybersecurity guidance for federal...
The future of maritime security

The future of maritime security

Capt. David Adams (USN, ret.), deputy editor-in-chief at the U.S. Naval Institute, discussed the future of maritime security.
Cybersecurity & the presidential transition

Cybersecurity & the presidential transition

Phil Bond, President and CEO of Bond & Associates and former Undersecretary of Commerce for technology, discusses the critical nature of...
From the Nation’s Capital: Addressing the Critical Demand for Cyber Pros

From the Nation’s Capital: Addressing the Critical Demand for Cyber Pros

This special program presented by (ISC)² focuses on the many challenges facing the cyber community. Francis Rose explores these issues...
Protecting against the insider threat

Protecting against the insider threat

David Buckley, managing director at KPMG and former Inspector General at the CIA, discusses how an agency can protect itself...
Cyber and NASA

Cyber and NASA

Dennis Vander Tuig, CIO and director of IT and communications at NASA’s Goddard Space Flight Center, discusses the cybersecurity priorities for his...
How industry is embracing agile development

How industry is embracing agile development

Ellen Glover, executive vice president at ICF, discusses the way she is seeing industry embrace agile development.
DOT takes stock of IT

DOT takes stock of IT

The Department of Transportation is in the midst of a year-long move to the cloud. First, the agency spent months...
TSA’s approach to enterprise risk management

TSA’s approach to enterprise risk management

Marianne Roth, branch manager for the Office of the Chief Risk Officer at the Transportation Security Administration, discussed how her...
The shift from perimeter defense to risk management

The shift from perimeter defense to risk management

Austin Adams, vice president of public sector at Alfresco, discussed the federal government’s shift in cyber mindset — from perimeter...
The Federal Beat (Cyber Edition)

The Federal Beat (Cyber Edition)

Former senior CIA official Ronald Marks, Covata vice president Nikki Parker, and Lawfare blog managing editor Susan Hennessey joined Francis...
The security implications of Heath IT

The security implications of Heath IT

Rear Admiral Jamie Barnett (U.S. Navy retired), partner in the Cybersecurity Practice at the Venable law firm, discusses how to...
Federal CISO calls for a change in cyber mindset

Federal CISO calls for a change in cyber mindset

The first federal chief information security officer delivered his opening salvo to the federal community on Tuesday. Brig. Gen. Gregory...
The changing cyber threat landscape

The changing cyber threat landscape

Brigadier General Steve Spano, president of the Center for Internet Security, discusses the changing cyber threat landscape.
NIST and the growing issue of ‘security fatigue.’

NIST and the growing issue of ‘security fatigue.’

Mary Thefanos, computer scientist at the National Institute of Standards and Technology, discussed how most computer users experience ‘security fatigue.’
GSA and Dun & Bradstreet renegotiate deal

GSA and Dun & Bradstreet renegotiate deal

Hudson Hollister, executive director of the Data Coalition, discusses the General Services Administration’s deal with Dun & Bradstreet on the use...
NBIB begins processing national background checks

NBIB begins processing national background checks

Beth McGrath, director of Deloitte Consulting’s federal sector, discussed the challenges ahead for the National Background Investigations Bureau.
Implications of ‘bolted on’ cyber solutions

Implications of ‘bolted on’ cyber solutions

Former CIA chief information security officer Robert Bigman discussed the implications of cyber solutions that are “bolted on after the...
Cyber plays small role in first presidential debate, looms large for next administration

Cyber plays small role in first presidential debate, looms large for next administration

Tony Cole, vice president and global government chief technology officer for FireEye, discussed cybersecurity challenges facing the next administration.
Cummiskey: Next DHS secretary should focus on people, money, organization, and components

Cummiskey: Next DHS secretary should focus on people, money, organization, and components

Chris Cummiskey, former acting undersecretary at the Department of Homeland Security, offered a four-point plan for the next DHS secretary....
Dynamic between federal, state and local law enforcement

Dynamic between federal, state and local law enforcement

Steve Bongardt — a former profiler for the FBI’s Behavioral Analysis Unit — discussed the dynamic between federal, state and...
How the Secret Service fights cyber crime

How the Secret Service fights cyber crime

U.S. Secret Service special agent Tate Jarrow, winner of a Service to America Medal in the ‘Call to Service’ category,...
Securing the Internet of things

Securing the Internet of things

Patrick Tucker, technology editor at Defense One, discusses security implications and risks of the Internet of Things.
Rule 41 of the federal rules of criminal procedure

Rule 41 of the federal rules of criminal procedure

Rainey Reitman, director of the activism team at the Electronic Frontier Foundation, discusses a rule that would make it easier...
An interview with former CIA Director Gen. Michael Hayden

An interview with former CIA Director Gen. Michael Hayden

General Michael Hayden, former director of the CIA and National Security Agency, weighs in on election integrity, Russian hackers and...
Pentagon eyes missile defense sensors in outer space

Pentagon eyes missile defense sensors in outer space

Marcus Weisgerber, global business editor at Defense One, discusses the Pentagon’s goal to expand its missile defense sensors to outer...
FBI teaching ransomware 101

FBI teaching ransomware 101

Mohana Ravindrinath, a reporter at NextGov, discusses a new effort by the FBI to educate the public on ransomware.
How to recruit the next generation of cyber professionals

How to recruit the next generation of cyber professionals

Kevin Reid, vice president of national security and chief information officer at KeyLogic, discusses the next generation of cyber professionals...
Building the next generation of cyber workers

Building the next generation of cyber workers

Veronica Villalobos, principal deputy associate director for the Office of Personnel Management’s Employee Services Division, discusses a new tool agencies...
Agency takeaways from NSA cyber practices

Agency takeaways from NSA cyber practices

Dave McClure, chief strategist of the Veris Group, discusses how agencies can manage their cyber vulnerabilities.
Recruiting the next generation of cyber talent

Recruiting the next generation of cyber talent

Wallace Sann, federal chief technology officer at ForeScout, discusses industry’s approach to recruiting the best cyber talent.
Plans to elevate U.S. Cyber Command

Plans to elevate U.S. Cyber Command

Rear Adm. Jamie Barnett (USN, Ret.), co-chair of the telecommunications group and cybersecurity practice at Venable, discussed the future of...
Impact of Presidential Policy Directive 41

Impact of Presidential Policy Directive 41

Ari Schwartz, managing director of cybersecurity at Venable, and former White House senior director for cybersecurity, gives his take on...
Sorting through a ‘Cambrian Explosion’ of cyber solutions

Sorting through a ‘Cambrian Explosion’ of cyber solutions

Bob Gourley, former chief technology officer at the Defense Intelligence Agency and co-founder of Cognitio, offered tips to federal agencies...
NASA Ames CIO outlines IT priorities

NASA Ames CIO outlines IT priorities

Jerry Davis, chief information officer at NASA’s Ames Research Center, discussed his office’s IT priorities.
DOJ OIG: FBI cyber threat review made progress, still needs work

DOJ OIG: FBI cyber threat review made progress, still needs work

Department of Justice Inspector General Michael Horowitz discussed cyber protections at the FBI and concerns about the agency’s case management...
The Federal Beat

The Federal Beat

Washington Technology editor-in-chief Nick Wakeman, NextGov senior correspondent Aliya Sternstein, and Federal News Radio reporter Meredith Somers discussed some of...
Russian hackers breach DNC network

Russian hackers breach DNC network

Former CIA chief information security officer Robert Bigman discussed Russian hackers’ cyberattack on the Democratic National Committee. He also offered...
Advancing NDAA during congressional recess

Advancing NDAA during congressional recess

Advancing NDAA during congressional recess with Andrew Hunter, Senior Fellow – International Security Program, CSIS.
Homegrown terror threat in America

Homegrown terror threat in America

Former FBI counterintelligence and terrorism agent Erroll Southers discussed the federal response to homegrown terrorism in the wake of Sunday’s...
The growth of DHS’s Automated Indicator Sharing (AIS) program

The growth of DHS’s Automated Indicator Sharing (AIS) program

According to FCW, The Department of Homeland Security’s Automated Indicator Sharing (AIS) program has at least 100 users. We discussed...
Stopping identity fraud’s drain on government

Stopping identity fraud’s drain on government

Stopping identity fraud’s drain on government with Andy Bucholz and Larry Benson authors of “WTF? Where’s the Fraud.”  
Report suggests federal cyber security has a long way to go

Report suggests federal cyber security has a long way to go

Last June, the Office of Personnel Management announced that the background records of current, former, and prospective federal workers and...
Federal encryption legislation and the market for zero-day vulnerabilities

Federal encryption legislation and the market for zero-day vulnerabilities

Last month, the FBI said it will not publicly disclose the method that allowed it to access a locked iPhone...
House approves update to Electronic Communications Privacy Act

House approves update to Electronic Communications Privacy Act

Last week, the House of Representatives gave its unanimous support to legislation that requires the government to get a search...
Rule 41: The latest front in privacy versus security

Rule 41: The latest front in privacy versus security

Last month, the U.S. Supreme Court approved changes to Rule 41 — a part of the criminal code that governs...
Hayden: Rogue attacks are the biggest cyber threat

Hayden: Rogue attacks are the biggest cyber threat

Gen. Michael Hayden has a singular security pedigree. He’s the only person to lead both the CIA and the National...
Navigating new FedRAMP security procedures

Navigating new FedRAMP security procedures

Matt Goodrich, director of the Federal Risk and Authorization Management Program at the General Services Administration, discussed FedRAMP’s new security...
Comey indicts State Department security culture

Comey indicts State Department security culture

Lawfare managing editor Susan Hennessey discussed FBI director James Comey’s indictment of security culture at the U.S. State Department.
Use of commercial data in federal programs

Use of commercial data in federal programs

Kathryn Larin, acting director of forensic audits at the Government Accountability Office, discussed the use of commercial data in federal...
Adding social media accounts to traveler data

Adding social media accounts to traveler data

Steve Bongardt, VP Security Consulting at Fidelis looks at the practice of adding social media accounts to traveler data.