Sign up for the Government Matters Daily Program Guide
Data Deep Dive
Get To Know
Innovation That Works
Open Season 2017
Open Season 2018
Tech Leadership Series
The Federal Beat
The Pentagon Beat
Agency takeaways from NSA cyber practices
Dave McClure, chief strategist of the Veris Group, discusses how agencies can manage their cyber vulnerabilities.
Recruiting the next generation of cyber talent
Wallace Sann, federal chief technology officer at ForeScout, discusses industry’s approach to recruiting the best cyber talent.
Plans to elevate U.S. Cyber Command
Rear Adm. Jamie Barnett (USN, Ret.), co-chair of the telecommunications group and cybersecurity practice at Venable, discussed the future of...
Impact of Presidential Policy Directive 41
Ari Schwartz, managing director of cybersecurity at Venable, and former White House senior director for cybersecurity, gives his take on...
Sorting through a ‘Cambrian Explosion’ of cyber solutions
Bob Gourley, former chief technology officer at the Defense Intelligence Agency and co-founder of Cognitio, offered tips to federal agencies...
NASA Ames CIO outlines IT priorities
Jerry Davis, chief information officer at NASA’s Ames Research Center, discussed his office’s IT priorities.
DOJ OIG: FBI cyber threat review made progress, still needs work
Department of Justice Inspector General Michael Horowitz discussed cyber protections at the FBI and concerns about the agency’s case management...
The Federal Beat
Washington Technology editor-in-chief Nick Wakeman, NextGov senior correspondent Aliya Sternstein, and Federal News Radio reporter Meredith Somers discussed some of...
Russian hackers breach DNC network
Former CIA chief information security officer Robert Bigman discussed Russian hackers’ cyberattack on the Democratic National Committee. He also offered...
Advancing NDAA during congressional recess
Advancing NDAA during congressional recess with Andrew Hunter, Senior Fellow – International Security Program, CSIS.
Homegrown terror threat in America
Former FBI counterintelligence and terrorism agent Erroll Southers discussed the federal response to homegrown terrorism in the wake of Sunday’s...
The growth of DHS’s Automated Indicator Sharing (AIS) program
According to FCW, The Department of Homeland Security’s Automated Indicator Sharing (AIS) program has at least 100 users. We discussed...
Stopping identity fraud’s drain on government
Stopping identity fraud’s drain on government with Andy Bucholz and Larry Benson authors of “WTF? Where’s the Fraud.”
Report suggests federal cyber security has a long way to go
Last June, the Office of Personnel Management announced that the background records of current, former, and prospective federal workers and...
Federal encryption legislation and the market for zero-day vulnerabilities
Last month, the FBI said it will not publicly disclose the method that allowed it to access a locked iPhone...
House approves update to Electronic Communications Privacy Act
Last week, the House of Representatives gave its unanimous support to legislation that requires the government to get a search...
Rule 41: The latest front in privacy versus security
Last month, the U.S. Supreme Court approved changes to Rule 41 — a part of the criminal code that governs...
Navigating new FedRAMP security procedures
Matt Goodrich, director of the Federal Risk and Authorization Management Program at the General Services Administration, discussed FedRAMP’s new security...
Comey indicts State Department security culture
Lawfare managing editor Susan Hennessey discussed FBI director James Comey’s indictment of security culture at the U.S. State Department.
Use of commercial data in federal programs
Kathryn Larin, acting director of forensic audits at the Government Accountability Office, discussed the use of commercial data in federal...
Adding social media accounts to traveler data
Steve Bongardt, VP Security Consulting at Fidelis looks at the practice of adding social media accounts to traveler data.
© Copyright 2019