Security Matters

Unintended consequences of White House phone ban

Unintended consequences of White House phone ban

Ronald Marks, chair of the Intelligence Program at the Daniel Morgan Graduate School Of National Security, discusses the impact of...
Cyber trends to watch in 2018

Cyber trends to watch in 2018

Phyllis Schneck, managing director and global leader of cyber solutions at Promontory, discusses the top cybersecurity trends to watch in...
Applying blockchain to government

Applying blockchain to government

Brian Whittaker, chief technology officer at Young Government Leaders, discusses the evolution of blockchain and how it could be applied...
Air Force gives ‘ethical hackers’ opportunity to hack its networks

Air Force gives ‘ethical hackers’ opportunity to hack its networks

Robert Bigman, founder of 2BSecure and former chief information security officer at the CIA, discusses the future of ‘bug bounty’...
U.S. blames North Korea for WannaCry cyberattack

U.S. blames North Korea for WannaCry cyberattack

Rear Adm. Jamie Barnett (USN, ret.), a partner in Venable’s cybersecurity practice, discusses comments from Department of Homeland Security advisor...
DoD cyber & risk management

DoD cyber & risk management

Tony Hubbard, principal of cybersecurity services at KPMG, discusses the Pentagon’s use of a risk management framework to cut cyber...
The key to reducing exposure to cyber liability

The key to reducing exposure to cyber liability

Brig. Gen. Gregory Touhill (USAF, Ret.), President of the Cyxtera Federal Group and former U.S. Chief Information Security Officer, discusses...
White House updates Vulnerability Equities Process

White House updates Vulnerability Equities Process

Ari Schwartz, managing director of cybersecurity services at Venable, discusses the Trump Administration’s update of the Vulnerability Equities Process.
Artificial Intelligence & Background Investigations

Artificial Intelligence & Background Investigations

Erin Hawley, vice president of public sector at DataRobot and Dan Conrad, federal chief technology officer at One Identity, discuss...
Role of cyber in digital transformation efforts

Role of cyber in digital transformation efforts

Maria Horton, president and CEO of EmeSec and Ron Marks, chair of the Intelligence Program at the Daniel Morgan Graduate...
One-on-One with OPM Chief Information Security Officer

One-on-One with OPM Chief Information Security Officer

Cord Chase, Chief Information Security Officer at the Office of Personnel Management, discusses cybersecurity strategy and goals of his office...
House committee approves surveillance reauthorization bill

House committee approves surveillance reauthorization bill

Jimmy Koo, senior legal editor for Bloomberg Law, discusses a decision by the House Judiciary Committee to reauthorize Section 702...
Common threads to international cyber diplomacy

Common threads to international cyber diplomacy

Christopher Painter, former coordinator for cyber issues at the State Department, discusses the importance of international cyber diplomacy.
IG report finds OPM still struggling with cyber

IG report finds OPM still struggling with cyber

Michael Esser, assistant inspector general for audits at the Office of Personnel Management, discusses the findings of their Federal Information...
Hundreds attend federal cyber & tech hiring fair

Hundreds attend federal cyber & tech hiring fair

NextGov Cybersecurity correspondent Joseph Marks discusses a handful of headlines from this week, including the government first ever cyber hiring...
Securing federal information systems & personally identifiable info

Securing federal information systems & personally identifiable info

Phyllis Schneck, managing director and global leader for cyber solutions at Promontory, discusses the evolving threat landscape and the high...
Cybersecurity priorities at the Health & Human Services Department

Cybersecurity priorities at the Health & Human Services Department

At the 2017 ACT-IAC Executive Leadership Conference Christopher Wlaschin, chief information security officer at the Health & Human Services Department,...
Kaspersky & the future of government cybersecurity

Kaspersky & the future of government cybersecurity

James Norton, founder and president at Play-Action Strategies, and Sean Kanuck, director of future conflict and cybersecurity at the International...
Defining a cyber moonshot

Defining a cyber moonshot

Gus Hunt, leader of the cybersecurity practice at Accenture Federal Services, discusses the five things federal agencies can do now...
DHS efforts bringing private sector innovation to government cyber

DHS efforts bringing private sector innovation to government cyber

Chris Cummiskey, CEO of Cummiskey Strategic Solutions and former acting undersecretary at the Department of Homeland Security, discusses how DHS...
The growth of artificial intelligence in cybersecurity

The growth of artificial intelligence in cybersecurity

Tony Hubbard, principal of cybersecurity services at KPMG, discusses the use of AI in the cyber realm — who’s using...
DHS orders agencies to implement email, website encryption tools

DHS orders agencies to implement email, website encryption tools

Joseph Marks, cybersecurity correspondent at NextGov, discusses the Department of Homeland Security’s Monday directive to agencies to implement new security...
Administration, agencies focus on cyber information sharing

Administration, agencies focus on cyber information sharing

Brig. Gen. Gregory Touhill (USAF, ret.), president of Cyxtera Federal Group, discusses cyber information sharing between industry and government.
Priorities for Army cyber and electronic warfare

Priorities for Army cyber and electronic warfare

Maj. Gen. John Morrison, commander of the Army Cyber Center of Excellence and Fort Gordon, discusses the Army’s evolving cyber...