Security Matters

Mission of ICE’s Homeland Security Investigations Office

Mission of ICE’s Homeland Security Investigations Office

Patricia Cogswell, assistant director of homeland security investigations in the Office of Intelligence at U.S. Immigration and Customs Enforcement, discusses...
Defense Department’s top cybersecurity priorities

Defense Department’s top cybersecurity priorities

Essye Miller, deputy chief information officer for cybersecurity at the Department of Defense, discusses efforts to build and maintain DoD’s...
Kaspersky software ordered off all government computers

Kaspersky software ordered off all government computers

Greg Otto, managing editor for CyberScoop, discusses the Homeland Security Department’s decision to order all federal agencies to stop using...
Oversight efforts in the Intelligence Community

Oversight efforts in the Intelligence Community

John Johanson, assistant inspector general for investigations in the Office of Inspector General of the Intelligence Community, discusses the unique...
The future of AI in federal cybersecurity

The future of AI in federal cybersecurity

Ari Schwartz, managing director of cybersecurity services for Venable, and Sam Curry, chief security officer for Cybereason, discuss some of...
Risks of centralizing government cybersecurity

Risks of centralizing government cybersecurity

Phyllis Schneck, former deputy undersecretary for cybersecurity and communications at the Department of Homeland Security, discusses the push at some...
Obama’s cyber czar calls for ‘a mix’ of centralized security

Obama’s cyber czar calls for ‘a mix’ of centralized security

Michael Daniel, president of the Cyber Threat Alliance and former White House cybersecurity coordinator, discusses the state of cyber collaboration...
CIA looks to private sector, Silicon Valley for innovation

CIA looks to private sector, Silicon Valley for innovation

Dawn Meyerriecks, deputy director for science and technology at the CIA, discusses where her agency is looking for innovative solutions...
Goals of Navy’s new digital warfare office

Goals of Navy’s new digital warfare office

Vice Adm. Jan Tighe, deputy chief of naval operations for information warfare and the director of naval intelligence, discusses how...
Status of the government security clearance backlog

Status of the government security clearance backlog

Beth McGrath, managing director at Deloitte, discusses how the adoption of new technologies could impact the security clearance process at...
Agencies start feeling the impact of connected cars

Agencies start feeling the impact of connected cars

Dave Wise, director of physical infrastructure issues at the Government Accountability Office, discusses the privacy implications of connected cars for...
Agencies’ approach to cyber forensics and recovery

Agencies’ approach to cyber forensics and recovery

Steve Bongardt, president of the Gyges Group, discusses the timeline of the investigation into the 2015 hack of the Office...
Cross-agency team honored for Medicare fraud investigation

Cross-agency team honored for Medicare fraud investigation

Kevin Nalu, special agent for criminal investigation at the IRS, discusses the work that earned him and three other colleagues...
The current state of cybersecurity at OPM

The current state of cybersecurity at OPM

David DeVries, chief information officer at the Office of Personnel Management, discusses the current state of cybersecurity at OPM, the...
Are arcane budget rules threatening government cybersecurity?

Are arcane budget rules threatening government cybersecurity?

Joseph Marks, cybersecurity correspondent for NextGov, discusses the budget rules and processes that could be impacting the governments cybersecurity.
Searching for a solution to the security clearance backlog

Searching for a solution to the security clearance backlog

David Berteau, president & CEO of the Professional Services Council, discusses the National Background Investigation Bureau’s effort to reduce the...
Assessing OPM data security in years after massive breach

Assessing OPM data security in years after massive breach

Lewis Parker, deputy assistant inspector general for audits at the Office of Personnel Management, discusses the Office of Inspectors General...
OMB satisfied with cybersecurity EO compliance

OMB satisfied with cybersecurity EO compliance

President Trump’s cybersecurity executive order called for agency heads to create a risk management report within 90 days — using the...
Crafting a successful federal cyber recipe

Crafting a successful federal cyber recipe

Brig. Gen. Gregory Touhill, president of Cyxtera Federal Group and former U.S. chief information security officer, discusses how defense and...
An enterprise risk management approach to cybersecurity

An enterprise risk management approach to cybersecurity

Richard Spires, CEO of Learning Tree International, discusses the emerging role of enterprise risk management in maintaining the safety of...
RSA Addressing Identity Risk

RSA Addressing Identity Risk

Sponsored: The Department of Defense is planning for the future of identity management and a new discipline is emerging. It’s...
House DHS authorization bill contains significant cyber provisions

House DHS authorization bill contains significant cyber provisions

Ron Marks, chair of the intelligence program at the Daniel Morgan Graduate School of National Security, discusses cybersecurity reforms contained...
NIST guidance prioritizes risk assessment

NIST guidance prioritizes risk assessment

John Banghart, senior director of technology risk management at Venable, and Rob Knake, senior fellow at the Council on Foreign Relations,...
DHS’ role in securing the next U.S. election

DHS’ role in securing the next U.S. election

Rear Adm. Jamie Barnett (USN, ret.), a partner is Venable’s cybersecurity practice, discussed the path forward after a recent Intelligence Community...