Security Matters

Agencies start feeling the impact of connected cars

Agencies start feeling the impact of connected cars

Dave Wise, director of physical infrastructure issues at the Government Accountability Office, discusses the privacy implications of connected cars for...
Agencies’ approach to cyber forensics and recovery

Agencies’ approach to cyber forensics and recovery

Steve Bongardt, president of the Gyges Group, discusses the timeline of the investigation into the 2015 hack of the Office...
Cross-agency team honored for Medicare fraud investigation

Cross-agency team honored for Medicare fraud investigation

Kevin Nalu, special agent for criminal investigation at the IRS, discusses the work that earned him and three other colleagues...
The current state of cybersecurity at OPM

The current state of cybersecurity at OPM

David DeVries, chief information officer at the Office of Personnel Management, discusses the current state of cybersecurity at OPM, the...
Are arcane budget rules threatening government cybersecurity?

Are arcane budget rules threatening government cybersecurity?

Joseph Marks, cybersecurity correspondent for NextGov, discusses the budget rules and processes that could be impacting the governments cybersecurity.
Searching for a solution to the security clearance backlog

Searching for a solution to the security clearance backlog

David Berteau, president & CEO of the Professional Services Council, discusses the National Background Investigation Bureau’s effort to reduce the...
Assessing OPM data security in years after massive breach

Assessing OPM data security in years after massive breach

Lewis Parker, deputy assistant inspector general for audits at the Office of Personnel Management, discusses the Office of Inspectors General...
OMB satisfied with cybersecurity EO compliance

OMB satisfied with cybersecurity EO compliance

President Trump’s cybersecurity executive order called for agency heads to create a risk management report within 90 days — using the...
Crafting a successful federal cyber recipe

Crafting a successful federal cyber recipe

Brig. Gen. Gregory Touhill, president of Cyxtera Federal Group and former U.S. chief information security officer, discusses how defense and...
An enterprise risk management approach to cybersecurity

An enterprise risk management approach to cybersecurity

Richard Spires, CEO of Learning Tree International, discusses the emerging role of enterprise risk management in maintaining the safety of...
RSA Addressing Identity Risk

RSA Addressing Identity Risk

Sponsored: The Department of Defense is planning for the future of identity management and a new discipline is emerging. It’s...
House DHS authorization bill contains significant cyber provisions

House DHS authorization bill contains significant cyber provisions

Ron Marks, chair of the intelligence program at the Daniel Morgan Graduate School of National Security, discusses cybersecurity reforms contained...
NIST guidance prioritizes risk assessment

NIST guidance prioritizes risk assessment

John Banghart, senior director of technology risk management at Venable, and Rob Knake, senior fellow at the Council on Foreign Relations,...
DHS’ role in securing the next U.S. election

DHS’ role in securing the next U.S. election

Rear Adm. Jamie Barnett (USN, ret.), a partner is Venable’s cybersecurity practice, discussed the path forward after a recent Intelligence Community...
Four possible agency responses to the DATA Act

Four possible agency responses to the DATA Act

Hudson Hollister, executive director of the Data Coalition, explained the different agency responses to this spring’s DATA Act deadline — non-compliance,...
House version of NDAA seeks DoD cyber improvements

House version of NDAA seeks DoD cyber improvements

Maria Horton, founder and CEO of EmeSec, discusses changes to U.S. cyber strategy as lawmakers in both the House and...
White House officials talk cybersecurity with world leaders

White House officials talk cybersecurity with world leaders

Tim Starks, cybersecurity reporter at Politico, discusses international meetings this week being attended by Homeland Security Secretary John Kelly and...
NIST seeking solutions to grow the cyber workforce

NIST seeking solutions to grow the cyber workforce

Rodney Petersen, director of NIST’s National Initiative for Cybersecurity Education, discusses the work NICE is doing to help bolster the...
Building a government-wide cybersecurity strategy

Building a government-wide cybersecurity strategy

Phyllis Schneck, managing director & global leader of cyber solutions at Promontory and former deputy undersecretary for cybersecurity and communications...
Policy and cultural concerns about cloud-based cyber security

Policy and cultural concerns about cloud-based cyber security

Robert Bigman, founder of 2BSecure and former Chief Information Security Officer at the CIA, discusses a major exposure of voter...
Taking charge of the federal cyber landscape

Taking charge of the federal cyber landscape

Ronald Marks, chair of the Intelligence Program at the Daniel Morgan Graduate School of National Security, discuss how agencies should...
Cybersecurity priorities at FEMA

Cybersecurity priorities at FEMA

Adrian Gardner, CIO at FEMA, discusses the work his agency is doing to comply with the White House’s cybersecurity executive...
Federal agencies seek to improve cyber posture

Federal agencies seek to improve cyber posture

Kevin Kelly, CEO at LGS Innovations and Wayne Lewandowski, area vice president of Federal at Thales e-Security, discuss the impact...
How open source is changing the IC

How open source is changing the IC

Lt. Gen. Mary Legere (USA, ret.), managing director for the national and defense intelligence business at Accenture, discussed the proliferation...