Sign up for the Government Matters Daily Program Guide
Data Deep Dive
Get To Know
Innovation That Works
Tech Leadership Series
The Federal Beat
The Pentagon Beat
Identity management and cyber initiatives in government
Jeremy Grant, managing director of technology business strategy at Venable, discusses the role identity management plays in government.
Broken links in the VA’s physical security chain
Lori Rectanus, director of physical infrastructure issues at the Government Accountability Office, discusses how some of the 170-plus buildings managed...
NSA & U.S. Cyber Command await officials in top leadership roles
Greg Otto, managing editor at CyberScoop, discusses the search for new top leadership at the National Security Agency and U.S....
IT Modernization Report & Trusted Internet Connections
Karen Evans, national director for the U.S. Cyber Challenge, discusses how the White House’s IT Modernization Report will impact the...
Federal government cybersecurity strategy & botnets
Bob Gourley, partner & co-founder at Cognitio, discusses how the federal government should deal with automated cyber threats, like botnets.
Unintended consequences of White House phone ban
Ronald Marks, chair of the Intelligence Program at the Daniel Morgan Graduate School Of National Security, discusses the impact of...
Cyber trends to watch in 2018
Phyllis Schneck, managing director and global leader of cyber solutions at Promontory, discusses the top cybersecurity trends to watch in...
Applying blockchain to government
Brian Whittaker, chief technology officer at Young Government Leaders, discusses the evolution of blockchain and how it could be applied...
Air Force gives ‘ethical hackers’ opportunity to hack its networks
Robert Bigman, founder of 2BSecure and former chief information security officer at the CIA, discusses the future of ‘bug bounty’...
U.S. blames North Korea for WannaCry cyberattack
Rear Adm. Jamie Barnett (USN, ret.), a partner in Venable’s cybersecurity practice, discusses comments from Department of Homeland Security advisor...
DoD cyber & risk management
Tony Hubbard, principal of cybersecurity services at KPMG, discusses the Pentagon’s use of a risk management framework to cut cyber...
The key to reducing exposure to cyber liability
Brig. Gen. Gregory Touhill (USAF, Ret.), President of the Cyxtera Federal Group and former U.S. Chief Information Security Officer, discusses...
White House updates Vulnerability Equities Process
Ari Schwartz, managing director of cybersecurity services at Venable, discusses the Trump Administration’s update of the Vulnerability Equities Process.
Artificial Intelligence & Background Investigations
Erin Hawley, vice president of public sector at Data Robot and Dan Conrad, federal chief technology officer at One Identity,...
Role of cyber in digital transformation efforts
Maria Horton, president and CEO of EmeSec and Ron Marks, chair of the Intelligence Program at the Daniel Morgan Graduate...
One-on-One with OPM Chief Information Security Officer
Cord Chase, Chief Information Security Officer at the Office of Personnel Management, discusses cybersecurity strategy and goals of his office...
House committee approves surveillance reauthorization bill
Jimmy Koo, senior legal editor for Bloomberg Law, discusses a decision by the House Judiciary Committee to reauthorize Section 702...
Common threads to international cyber diplomacy
Christopher Painter, former coordinator for cyber issues at the State Department, discusses the importance of international cyber diplomacy.
IG report finds OPM still struggling with cyber
Michael Esser, assistant inspector general for audits at the Office of Personnel Management, discusses the findings of their Federal Information...
Hundreds attend federal cyber & tech hiring fair
NextGov Cybersecurity correspondent Joseph Marks discusses a handful of headlines from this week, including the government first ever cyber hiring...
Securing federal information systems & personally identifiable info
Phyllis Schneck, managing director and global leader for cyber solutions at Promontory, discusses the evolving threat landscape and the high...
Cybersecurity priorities at the Health & Human Services Department
At the 2017 ACT-IAC Executive Leadership Conference Christopher Wlaschin, chief information security officer at the Health & Human Services Department,...
Kaspersky & the future of government cybersecurity
James Norton, founder and president at Play-Action Strategies, and Sean Kanuck, director of future conflict and cybersecurity at the International...
Defining a cyber moonshot
Gus Hunt, leader of the cybersecurity practice at Accenture Federal Services, discusses the five things federal agencies can do now...
© Copyright 2018