Sign up for the Government Matters Daily Program Guide
Data Deep Dive
Get To Know
Tech Leadership Series
The Federal Beat
The Pentagon Beat
The future of AI in federal cybersecurity
Ari Schwartz, managing director of cybersecurity services for Venable, and Sam Curry, chief security officer for Cybereason, discuss some of...
Risks of centralizing government cybersecurity
Phyllis Schneck, former deputy undersecretary for cybersecurity and communications at the Department of Homeland Security, discusses the push at some...
Obama’s cyber czar calls for ‘a mix’ of centralized security
Michael Daniel, president of the Cyber Threat Alliance and former White House cybersecurity coordinator, discusses the state of cyber collaboration...
Smart IoT security as the path forward for data-centric government
For government, the paradigm shift to an Internet of Things is already underway. The lynchpin is sensors — and lots...
OMB satisfied with cybersecurity EO compliance
President Trump’s cybersecurity executive order called for agency heads to create a risk management report within 90 days — using the...
Crafting a successful federal cyber recipe
Brig. Gen. Gregory Touhill, president of Cyxtera Federal Group and former U.S. chief information security officer, discusses how defense and...
An enterprise risk management approach to cybersecurity
Richard Spires, CEO of Learning Tree International, discusses the emerging role of enterprise risk management in maintaining the safety of...
House DHS authorization bill contains significant cyber provisions
Ron Marks, chair of the intelligence program at the Daniel Morgan Graduate School of National Security, discusses cybersecurity reforms contained...
Federal agencies seek to improve cyber posture
Kevin Kelly, CEO at LGS Innovations and Wayne Lewandowski, area vice president of Federal at Thales e-Security, discuss the impact...
Mapping an approach to cyber procurement
Chris Cummiskey, CEO of Cummiskey Strategic Solutions and former acting undersecretary at the Department of Homeland Security, discussed cyber procurement...
Bridging the gap between compliance and security
Ira Hobbs, former deputy assistant secretary for IT at the Treasury Department, discussed what agencies can do to get a...
NOAA CIO: “Our vision is about agile”
The National Oceanic and Atmospheric Administration has a slew of IT projects advancing simultaneously. Today, the agency is both a...
DOE seeks new maturity model for information security
Kathleen Tighe, inspector general at the Department of Education, discussed vulnerabilities in DOE’s information security programs.
White House initiatives driving workforce priorities at DHS
Roland Edwards, deputy chief human capital officer at the Department of Homeland Security, discussed how the government reorganization memo and...
Comey firing & the cybersecurity leadership gap at federal agencies
Nafeesa Syeed, national security and cyber reporter at Bloomberg, discussed the firing of FBI director James Comey and its impact...
Agencies await management agenda from the White House
Robert Shea, principal at Grant Thornton, discussed clues to President Trump’s management agenda buried in his executive order on cybersecurity.
Cybersecurity executive order aimed at federal networks, infrastructure
Gregory Touhill (USAF, Ret.), former U.S. Chief Information Security Officer and recipient of the 2017 (ISC)² F. Lynn McNulty GISLA...
President Trump signs cybersecurity executive order
On Thursday, President Trump signed an executive order titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” The order...
FedRAMP aims to bridge the gap between government and industry
FedRAMP director Matt Goodrich discussed the purpose behind FedRAMP Connect, the announcement that seven cloud vendors have received prioritization, and...
What’s in a name? For NPPD, a new one could reflect changing priorities
Phyllis Schneck, managing director of cyber solutions at Promontory Financial Group and former deputy undersecretary for cybersecurity at the Department...
Is Your Agency Blind to Cyber Risks?
Sponsored: Do you remember the driver’s education classes you took as a teenager? Checking blind spots was one of the...
Agencies await cybersecurity guidance from the White House
Tony Hubbard, principal of cybersecurity services at KPMG, discussed the ways agencies are improving their cyber defense.
GSA working with DHS to streamline cyber procurement
The General Services Administration is looking to streamline the way agencies are buying cyber solutions. Now, they will have access...
Making sense of agencies’ cyber priorities
Ari Schwartz, managing director of cybersecurity services at Venable and former senior director of cybersecurity at the White House, discussed...
OMB: Federal agencies are doing a better job at securing their networks
Rear Adm. Jamie Barnett (USN, ret.), partner in the cybersecurity practice at Venable, discussed the results of this year’s FISMA...
The importance of personnel to national cybersecurity
Earl Crane, CEO of Emergent Network Defense and former White House director of federal cybersecurity policy, discussed an op-ed he...
Impact of federal hiring freeze on national security
Richard Spires, CEO at Learning Tree International, discusses how CIOs in government can navigate the federal hiring freeze and work...
Trump delays signing of cybersecurity executive order
Mike Hettinger, president of Hettinger Strategy Group and Rich Beutel, principal at Cyrrus Analytics, discuss the details known so far...
RSA Securing the Federal Mission
Sponsored: Cyber attacks on the federal government. How will security evolve? Steve Schmalz, Federal CTO for RSA discusses the issues facing...
The Obama administration’s cyber legacy
Joseph Marks, cybersecurity correspondent at NextGov, discusses the good and the bad of the Obama administration’s cyber legacy.
Trump administration’s 90-day cyber plan
Maria Horton, president and CEO at Emesec, discusses President-Elect Trump’s call for a 90-day plan to stop or slow cyber...
The Future of Government CyberSecurity
Sponsored Content: Tom Ruff VP of Solutions Sales at Akamai discusses the future of Government Cyber Security During 2015, federal...
Trump calls for cyber plan in first 90 days
Tony Cole, vice president and global government chief technology officer at FireEye, discusses government “cyber hygiene” and how it can...
Lessons learned by presidential fellows
Rosetta Carrington, senior contact center advisor at the Department of Veterans Affairs, and Clifton Triplett, senior cybersecurity and IT advisor...
Recommendations from the Commission on Enhancing National Cybersecurity
Robert Bigman, founder of 2BSecure and former chief information security officer at the CIA, discussed pending recommendations from the Commission...
NIST releases new cybersecurity guidelines
Ron Ross, fellow at the National Institute of Standards and Technology, discussed 800-160 — NIST’s newly-released cybersecurity guidance for federal...
Federal CISO calls for a change in cyber mindset
The first federal chief information security officer delivered his opening salvo to the federal community on Tuesday. Brig. Gen. Gregory...
Cyber plays small role in first presidential debate, looms large for next administration
Tony Cole, vice president and global government chief technology officer for FireEye, discussed cybersecurity challenges facing the next administration.
The Federal Beat
FedScoop tech editor Greg Otto, NextGov executive editor Camille Tuutti, and Bloomberg cybersecurity reporter Jordan Robertson joined Francis for a...
Government Matters (Full Show) – August 21, 2016
Sunday on Government Matters: Austin Price, innovation operations manager for the Unified Shared Services Management Office at the General Services...
How effective are report cards in measuring cyber success?
Robert Bigman, founder of 2BSecure and former Chief Information Security Officer at the CIA, talks about the effectiveness of report...
Plans to elevate U.S. Cyber Command
Rear Adm. Jamie Barnett (USN, Ret.), co-chair of the telecommunications group and cybersecurity practice at Venable, discussed the future of...
DARPA’s cyber grand challenge
FedScoop technology editor Greg Otto explained why the Defense Advanced Research Projects Agency, or DARPA, is searching for cybersecurity solutions...
TSP’s 5-year plan focuses on cybersecurity
Kim Weaver, director of external affairs at the Federal Retirement Thrift Investment Board, discussed a strategy shift for the Thrift...
Investigation into Library of Congress cyber attack
Nikki Parker, vice president of growth & strategy at Covata, discussed the investigation into a cyber attack on the Library...
Sorting through a ‘Cambrian Explosion’ of cyber solutions
Bob Gourley, former chief technology officer at the Defense Intelligence Agency and co-founder of Cognitio, offered tips to federal agencies...
DOJ OIG: FBI cyber threat review made progress, still needs work
Department of Justice Inspector General Michael Horowitz discussed cyber protections at the FBI and concerns about the agency’s case management...
DoD cyber and workforce priorities
Terry Halvorsen, Chief Information Officer of the Defense Department, talked about the department’s goals and biggest challenges in building out it’s...
Recruiting cyber talent to the DoD
According to Federal News Radio, Chris Lynch — director of digital services at the Defense Department — said “it’s been...
Report suggests federal cyber security has a long way to go
Last June, the Office of Personnel Management announced that the background records of current, former, and prospective federal workers and...
What are the ‘rules of engagement’ for a cyber conflict?
Rear Adm. Jamie Barnett (ret.), partner in Venable’s cybersecurity practice, discussed the lack of set ‘rules of engagement’ for cyber...
Government Matters (Full Show) – July 13, 2016
On Wednesday’s edition of Government Matters: Rear Adm. Jamie Barnett (ret.), partner in Venable’s cybersecurity practice, discussed the lack of...
Rule 41: The latest front in privacy versus security
Last month, the U.S. Supreme Court approved changes to Rule 41 — a part of the criminal code that governs...
Hayden: Rogue attacks are the biggest cyber threat
Gen. Michael Hayden has a singular security pedigree. He’s the only person to lead both the CIA and the National...
© Copyright 2017