Security Matters

Four possible agency responses to the DATA Act

Four possible agency responses to the DATA Act

Hudson Hollister, executive director of the Data Coalition, explained the different agency responses to this spring’s DATA Act deadline — non-compliance,...
House version of NDAA seeks DoD cyber improvements

House version of NDAA seeks DoD cyber improvements

Maria Horton, founder and CEO of EmeSec, discusses changes to U.S. cyber strategy as lawmakers in both the House and...
White House officials talk cybersecurity with world leaders

White House officials talk cybersecurity with world leaders

Tim Starks, cybersecurity reporter at Politico, discusses international meetings this week being attended by Homeland Security Secretary John Kelly and...
NIST seeking solutions to grow the cyber workforce

NIST seeking solutions to grow the cyber workforce

Rodney Petersen, director of NIST’s National Initiative for Cybersecurity Education, discusses the work NICE is doing to help bolster the...
Building a government-wide cybersecurity strategy

Building a government-wide cybersecurity strategy

Phyllis Schneck, managing director & global leader of cyber solutions at Promontory and former deputy undersecretary for cybersecurity and communications...
Policy and cultural concerns about cloud-based cyber security

Policy and cultural concerns about cloud-based cyber security

Robert Bigman, founder of 2BSecure and former Chief Information Security Officer at the CIA, discusses a major exposure of voter...
Taking charge of the federal cyber landscape

Taking charge of the federal cyber landscape

Ronald Marks, chair of the Intelligence Program at the Daniel Morgan Graduate School of National Security, discuss how agencies should...
Cybersecurity priorities at FEMA

Cybersecurity priorities at FEMA

Adrian Gardner, CIO at FEMA, discusses the work his agency is doing to comply with the White House’s cybersecurity executive...
Federal agencies seek to improve cyber posture

Federal agencies seek to improve cyber posture

Kevin Kelly, CEO at LGS Innovations and Wayne Lewandowski, area vice president of Federal at Thales e-Security, discuss the impact...
How open source is changing the IC

How open source is changing the IC

Lt. Gen. Mary Legere (USA, ret.), managing director for the national and defense intelligence business at Accenture, discussed the proliferation...
Mapping an approach to cyber procurement

Mapping an approach to cyber procurement

Chris Cummiskey, CEO of Cummiskey Strategic Solutions and former acting undersecretary at the Department of Homeland Security, discussed cyber procurement...
Bridging the gap between compliance and security

Bridging the gap between compliance and security

Ira Hobbs, former deputy assistant secretary for IT at the Treasury Department, discussed what agencies can do to get a...
NOAA CIO: “Our vision is about agile”

NOAA CIO: “Our vision is about agile”

The National Oceanic and Atmospheric Administration has a slew of IT projects advancing simultaneously. Today, the agency is both a...
DOE seeks new maturity model for information security

DOE seeks new maturity model for information security

Kathleen Tighe, inspector general at the Department of Education, discussed vulnerabilities in DOE’s information security programs.
Comey firing & the cybersecurity leadership gap at federal agencies

Comey firing & the cybersecurity leadership gap at federal agencies

Nafeesa Syeed, national security and cyber reporter at Bloomberg, discussed the firing of FBI director James Comey and its impact...
Agencies await management agenda from the White House

Agencies await management agenda from the White House

Robert Shea, principal at Grant Thornton, discussed clues to President Trump’s management agenda buried in his executive order on cybersecurity.
FTC team builds IdentityTheft.gov to help consumers

FTC team builds IdentityTheft.gov to help consumers

Nat Wood, associate director of Consumer & Business Education at the Federal Trade Commission, discusses his teams’ work designing and...
White House issues cybersecurity executive order

White House issues cybersecurity executive order

Maria Horton, president and CEO at EmeSec, discusses how agencies should be implementing the White House’s new cybersecurity executive order.
Cybersecurity executive order aimed at federal networks, infrastructure

Cybersecurity executive order aimed at federal networks, infrastructure

Gregory Touhill (USAF, Ret.), former U.S. Chief Information Security Officer and recipient of the 2017 (ISC)² F. Lynn McNulty GISLA...
President Trump signs cybersecurity executive order

President Trump signs cybersecurity executive order

On Thursday, President Trump signed an executive order titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” The order...
DHS releases study on mobile device security

DHS releases study on mobile device security

Vincent Sritapan, program manager for the Homeland Security Advanced Research Projects Agency at DHS, discusses the agency’s latest study of...
What’s in a name? For NPPD, a new one could reflect changing priorities

What’s in a name? For NPPD, a new one could reflect changing priorities

Phyllis Schneck, managing director of cyber solutions at Promontory Financial Group and former deputy undersecretary for cybersecurity at the Department...
Systems engineering of cyber resilient and secure weapons

Systems engineering of cyber resilient and secure weapons

Linnie Haynesworth, general manager of cyber solutions at Northrop Grumman, discusses Defense Department’s new strategies for cyber resilient and secure...
Agencies grapple with shadow I.T. problem

Agencies grapple with shadow I.T. problem

Robert Bigman, president of 2BSecure, discusses how the federal government is grappling with it’s growing shadow I.T. problem.