Cybersecurity

The future of AI in federal cybersecurity

The future of AI in federal cybersecurity

Ari Schwartz, managing director of cybersecurity services for Venable, and Sam Curry, chief security officer for Cybereason, discuss some of...
Risks of centralizing government cybersecurity

Risks of centralizing government cybersecurity

Phyllis Schneck, former deputy undersecretary for cybersecurity and communications at the Department of Homeland Security, discusses the push at some...
Obama’s cyber czar calls for ‘a mix’ of centralized security

Obama’s cyber czar calls for ‘a mix’ of centralized security

Michael Daniel, president of the Cyber Threat Alliance and former White House cybersecurity coordinator, discusses the state of cyber collaboration...
Smart IoT security as the path forward for data-centric government

Smart IoT security as the path forward for data-centric government

For government, the paradigm shift to an Internet of Things is already underway. The lynchpin is sensors — and lots...
OMB satisfied with cybersecurity EO compliance

OMB satisfied with cybersecurity EO compliance

President Trump’s cybersecurity executive order called for agency heads to create a risk management report within 90 days — using the...
Crafting a successful federal cyber recipe

Crafting a successful federal cyber recipe

Brig. Gen. Gregory Touhill, president of Cyxtera Federal Group and former U.S. chief information security officer, discusses how defense and...
An enterprise risk management approach to cybersecurity

An enterprise risk management approach to cybersecurity

Richard Spires, CEO of Learning Tree International, discusses the emerging role of enterprise risk management in maintaining the safety of...
House DHS authorization bill contains significant cyber provisions

House DHS authorization bill contains significant cyber provisions

Ron Marks, chair of the intelligence program at the Daniel Morgan Graduate School of National Security, discusses cybersecurity reforms contained...
Federal agencies seek to improve cyber posture

Federal agencies seek to improve cyber posture

Kevin Kelly, CEO at LGS Innovations and Wayne Lewandowski, area vice president of Federal at Thales e-Security, discuss the impact...
Mapping an approach to cyber procurement

Mapping an approach to cyber procurement

Chris Cummiskey, CEO of Cummiskey Strategic Solutions and former acting undersecretary at the Department of Homeland Security, discussed cyber procurement...
Bridging the gap between compliance and security

Bridging the gap between compliance and security

Ira Hobbs, former deputy assistant secretary for IT at the Treasury Department, discussed what agencies can do to get a...
NOAA CIO: “Our vision is about agile”

NOAA CIO: “Our vision is about agile”

The National Oceanic and Atmospheric Administration has a slew of IT projects advancing simultaneously. Today, the agency is both a...
DOE seeks new maturity model for information security

DOE seeks new maturity model for information security

Kathleen Tighe, inspector general at the Department of Education, discussed vulnerabilities in DOE’s information security programs.
White House initiatives driving workforce priorities at DHS

White House initiatives driving workforce priorities at DHS

Roland Edwards, deputy chief human capital officer at the Department of Homeland Security, discussed how the government reorganization memo and...
Comey firing & the cybersecurity leadership gap at federal agencies

Comey firing & the cybersecurity leadership gap at federal agencies

Nafeesa Syeed, national security and cyber reporter at Bloomberg, discussed the firing of FBI director James Comey and its impact...
Agencies await management agenda from the White House

Agencies await management agenda from the White House

Robert Shea, principal at Grant Thornton, discussed clues to President Trump’s management agenda buried in his executive order on cybersecurity.
Cybersecurity executive order aimed at federal networks, infrastructure

Cybersecurity executive order aimed at federal networks, infrastructure

Gregory Touhill (USAF, Ret.), former U.S. Chief Information Security Officer and recipient of the 2017 (ISC)² F. Lynn McNulty GISLA...
President Trump signs cybersecurity executive order

President Trump signs cybersecurity executive order

On Thursday, President Trump signed an executive order titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” The order...
FedRAMP aims to bridge the gap between government and industry

FedRAMP aims to bridge the gap between government and industry

FedRAMP director Matt Goodrich discussed the purpose behind FedRAMP Connect, the announcement that seven cloud vendors have received prioritization, and...
What’s in a name? For NPPD, a new one could reflect changing priorities

What’s in a name? For NPPD, a new one could reflect changing priorities

Phyllis Schneck, managing director of cyber solutions at Promontory Financial Group and former deputy undersecretary for cybersecurity at the Department...
Is Your Agency Blind to Cyber Risks?

Is Your Agency Blind to Cyber Risks?

Sponsored: Do you remember the driver’s education classes you took as a teenager? Checking blind spots was one of the...
Agencies await cybersecurity guidance from the White House

Agencies await cybersecurity guidance from the White House

Tony Hubbard, principal of cybersecurity services at KPMG, discussed the ways agencies are improving their cyber defense.
GSA working with DHS to streamline cyber procurement

GSA working with DHS to streamline cyber procurement

The General Services Administration is looking to streamline the way agencies are buying cyber solutions. Now, they will have access...
Making sense of agencies’ cyber priorities

Making sense of agencies’ cyber priorities

Ari Schwartz, managing director of cybersecurity services at Venable and former senior director of cybersecurity at the White House, discussed...
OMB: Federal agencies are doing a better job at securing their networks

OMB: Federal agencies are doing a better job at securing their networks

Rear Adm. Jamie Barnett (USN, ret.), partner in the cybersecurity practice at Venable, discussed the results of this year’s FISMA...
The importance of personnel to national cybersecurity

The importance of personnel to national cybersecurity

Earl Crane, CEO of Emergent Network Defense and former White House director of federal cybersecurity policy, discussed an op-ed he...
Impact of federal hiring freeze on national security

Impact of federal hiring freeze on national security

Richard Spires, CEO at Learning Tree International, discusses how CIOs in government can navigate the federal hiring freeze and work...
Trump delays signing of cybersecurity executive order

Trump delays signing of cybersecurity executive order

Mike Hettinger, president of Hettinger Strategy Group and Rich Beutel, principal at Cyrrus Analytics, discuss the details known so far...
RSA Securing the Federal Mission

RSA Securing the Federal Mission

Sponsored: Cyber attacks on the federal government. How will security evolve? Steve Schmalz, Federal CTO for RSA discusses the issues facing...
The Obama administration’s cyber legacy

The Obama administration’s cyber legacy

Joseph Marks, cybersecurity correspondent at NextGov, discusses the good and the bad of the Obama administration’s cyber legacy.
Trump administration’s 90-day cyber plan

Trump administration’s 90-day cyber plan

Maria Horton, president and CEO at Emesec, discusses President-Elect Trump’s call for a 90-day plan to stop or slow cyber...
The Future of Government CyberSecurity

The Future of Government CyberSecurity

Sponsored Content: Tom Ruff VP of Solutions Sales at Akamai discusses the future of Government Cyber Security During 2015, federal...
Trump calls for cyber plan in first 90 days

Trump calls for cyber plan in first 90 days

Tony Cole, vice president and global government chief technology officer at FireEye, discusses government “cyber hygiene” and how it can...
Lessons learned by presidential fellows

Lessons learned by presidential fellows

Rosetta Carrington, senior contact center advisor at the Department of Veterans Affairs, and Clifton Triplett, senior cybersecurity and IT advisor...
Recommendations from the Commission on Enhancing National Cybersecurity

Recommendations from the Commission on Enhancing National Cybersecurity

Robert Bigman, founder of 2BSecure and former chief information security officer at the CIA, discussed pending recommendations from the Commission...
NIST releases new cybersecurity guidelines

NIST releases new cybersecurity guidelines

Ron Ross, fellow at the National Institute of Standards and Technology, discussed 800-160 — NIST’s newly-released cybersecurity guidance for federal...
Federal CISO calls for a change in cyber mindset

Federal CISO calls for a change in cyber mindset

The first federal chief information security officer delivered his opening salvo to the federal community on Tuesday. Brig. Gen. Gregory...
Cyber plays small role in first presidential debate, looms large for next administration

Cyber plays small role in first presidential debate, looms large for next administration

Tony Cole, vice president and global government chief technology officer for FireEye, discussed cybersecurity challenges facing the next administration.
The Federal Beat

The Federal Beat

FedScoop tech editor Greg Otto, NextGov executive editor Camille Tuutti, and Bloomberg cybersecurity reporter Jordan Robertson joined Francis for a...
Government Matters (Full Show) – August 21, 2016

Government Matters (Full Show) – August 21, 2016

Sunday on Government Matters: Austin Price, innovation operations manager for the Unified Shared Services Management Office at the General Services...
How effective are report cards in measuring cyber success?

How effective are report cards in measuring cyber success?

Robert Bigman, founder of 2BSecure and former Chief Information Security Officer at the CIA, talks about the effectiveness of report...
Plans to elevate U.S. Cyber Command

Plans to elevate U.S. Cyber Command

Rear Adm. Jamie Barnett (USN, Ret.), co-chair of the telecommunications group and cybersecurity practice at Venable, discussed the future of...
DARPA’s cyber grand challenge

DARPA’s cyber grand challenge

FedScoop technology editor Greg Otto explained why the Defense Advanced Research Projects Agency, or DARPA, is searching for cybersecurity solutions...
TSP’s 5-year plan focuses on cybersecurity

TSP’s 5-year plan focuses on cybersecurity

Kim Weaver, director of external affairs at the Federal Retirement Thrift Investment Board, discussed a strategy shift for the Thrift...
Investigation into Library of Congress cyber attack

Investigation into Library of Congress cyber attack

Nikki Parker, vice president of growth & strategy at Covata, discussed the investigation into a cyber attack on the Library...
Sorting through a ‘Cambrian Explosion’ of cyber solutions

Sorting through a ‘Cambrian Explosion’ of cyber solutions

Bob Gourley, former chief technology officer at the Defense Intelligence Agency and co-founder of Cognitio, offered tips to federal agencies...
DOJ OIG: FBI cyber threat review made progress, still needs work

DOJ OIG: FBI cyber threat review made progress, still needs work

Department of Justice Inspector General Michael Horowitz discussed cyber protections at the FBI and concerns about the agency’s case management...
DoD cyber and workforce priorities

DoD cyber and workforce priorities

Terry Halvorsen, Chief Information Officer of the Defense Department, talked about the department’s goals and biggest challenges in building out it’s...
Recruiting cyber talent to the DoD

Recruiting cyber talent to the DoD

According to Federal News Radio, Chris Lynch — director of digital services at the Defense Department — said “it’s been...
Report suggests federal cyber security has a long way to go

Report suggests federal cyber security has a long way to go

Last June, the Office of Personnel Management announced that the background records of current, former, and prospective federal workers and...
What are the ‘rules of engagement’ for a cyber conflict?

What are the ‘rules of engagement’ for a cyber conflict?

Rear Adm. Jamie Barnett (ret.), partner in Venable’s cybersecurity practice, discussed the lack of set ‘rules of engagement’ for cyber...
Government Matters (Full Show) – July 13, 2016

Government Matters (Full Show) – July 13, 2016

On Wednesday’s edition of Government Matters: Rear Adm. Jamie Barnett (ret.), partner in Venable’s cybersecurity practice, discussed the lack of...
Rule 41: The latest front in privacy versus security

Rule 41: The latest front in privacy versus security

Last month, the U.S. Supreme Court approved changes to Rule 41 — a part of the criminal code that governs...
Hayden: Rogue attacks are the biggest cyber threat

Hayden: Rogue attacks are the biggest cyber threat

Gen. Michael Hayden has a singular security pedigree. He’s the only person to lead both the CIA and the National...