Security Matters

Energy Dept. to test infrastructure durability to cyber attacks

Energy Dept. to test infrastructure durability to cyber attacks

Ross Rustici, Senior Director of Intelligence Services at Cybereason, discusses the upcoming energy grid exercise, and why communication is an...
Background investigations move from OPM to DSS

Background investigations move from OPM to DSS

Charles Phalen, director of the National Background Investigation Bureau at the Office of Personnel Management, discusses moving his organization’s functions...
DISA explores alternatives to Common Access Card

DISA explores alternatives to Common Access Card

Steve Wallace, Technical Director of the Development & Business Center at DISA and Jeremy Corey, Chief of the Cyber Innovation...
DHS launches new national risk management center

DHS launches new national risk management center

Ari Schwartz, managing director of cybersecurity services at Venable, discusses the new Department of Homeland Security risk management center, and...
New Cyber Command leader pushes for more aggressive cyber defense

New Cyber Command leader pushes for more aggressive cyber defense

Ron Marks, intelligence program chair at the Daniel Morgan Graduate School of National Security, discusses what a more “aggressive” stance...
Race for tech supremacy in the defense sector

Race for tech supremacy in the defense sector

Michael Hermus, former Department of Homeland Security CTO and CEO & Managing Partner at Revolution Four Group, discusses the changing...
DISA looks to replace common access card with better alternatives

DISA looks to replace common access card with better alternatives

Terry Halvorsen, former Department of Defense CIO & executive vice president of IT & Mobile Communications at Samsung Electronics, discusses...
Application of AI to prevent, detect cyber threats

Application of AI to prevent, detect cyber threats

Amy O’Connor, chief information officer at Cloudera and Patrick Sullivan, global director of Security Strategy at Akamai, discuss the growing...
Bill proposes blocking social media & personal e-mail at agencies

Bill proposes blocking social media & personal e-mail at agencies

Tony Cole, chief technology officer at Attivo Networks, discusses the recently introduced Federal Information Systems Safeguards Act, and why some...
Priorities for DLA’s Cyber Resilience Integration Initiative

Priorities for DLA’s Cyber Resilience Integration Initiative

Linus Baker, cybersecurity director at the Defense Logistics Agency, discusses the new cyber programs at the organization, and what they...
Government cyber leaders facing a ‘fog of more’

Government cyber leaders facing a ‘fog of more’

Tony Sager, senior vice president of the Center for Internet Security, discusses the increasingly complicated cybersecurity landscape, and the “fog...
HHS response team defends health care systems from cyberattack

HHS response team defends health care systems from cyberattack

Stephen Curren, director of the Resilience Division in the Office of the Assistant Secretary for Preparedness and Response at HHS,...
Challenges in offensive cyber operations

Challenges in offensive cyber operations

Robert Bigman, founder of 2BSecure and former CIA Chief Information Security Officer, discusses the idea of “hack-backs” and why he...
The Department of Energy establishes CESER office

The Department of Energy establishes CESER office

Brig. Gen. Gregory Touhill (USAF, ret.), President of Cyxtera Federal Group, discusses the Department of Energy’s new security and emergency...
DHS releases cybersecurity strategy

DHS releases cybersecurity strategy

Ari Schwartz, managing director of cybersecurity services at Venable, discusses the new Department of Homeland Security cyber outline and the...
Lawmakers look to save White House cyber coordinator role

Lawmakers look to save White House cyber coordinator role

Tony Cole, chief technology officer at Attivo Networks, discusses congressional efforts to save the position of White House Cybersecurity Coordinator...
Status of DHS’s Continuous Diagnostics & Mitigation program

Status of DHS’s Continuous Diagnostics & Mitigation program

Kevin Cox, CDM program manager at the Department of Homeland Security, details how the data collected by the initiative will...
Evolution towards managed security services in government

Evolution towards managed security services in government

Robert Bigman, Former CISO at CIA and founder of 2BSecure, discusses the outlook for managed security at federal agencies, and...
Examining the approval process for government-backed cyberattacks

Examining the approval process for government-backed cyberattacks

Chris Bing, associate editor at CyberScoop, discusses how members of the National Security Council are looking to change the way...
Report: 1 in 50 govt. contractors are properly securing email

Report: 1 in 50 govt. contractors are properly securing email

Bob Gourley, former Defense Intelligence Agency CTO and publisher of CTOvision, discusses the failure of government IT contractors to incorporate...
Civilian vs. military approach to identity & access management

Civilian vs. military approach to identity & access management

Brig. Gen. Gregory Touhill (USAF Ret.), former federal chief information security officer and president at Cyxtera Federal Group, discusses problems...
“Hack Your State Dept” bill to run agency bug bounties

“Hack Your State Dept” bill to run agency bug bounties

Ari Schwartz, managing director of cybersecurity services at Venable, discusses a bill in Congress that would make the State Department...
Challenges in government cyber risk mitigation

Challenges in government cyber risk mitigation

George DeLisle, federal sales director at Varonis, discusses the White House’s planned action on cybersecurity, and how industry is interested...
CLOUD Act passes in omnibus spending bill

CLOUD Act passes in omnibus spending bill

FCW Staff Writer Derek Johnson and Joseph Marks, Cybersecurity Correspondent at Nextgov, discuss the latest cybersecurity stories out of Congress,...