Security Matters

Mapping an approach to cyber procurement

Mapping an approach to cyber procurement

Chris Cummiskey, CEO of Cummiskey Strategic Solutions and former acting undersecretary at the Department of Homeland Security, discussed cyber procurement...
Bridging the gap between compliance and security

Bridging the gap between compliance and security

Ira Hobbs, former deputy assistant secretary for IT at the Treasury Department, discussed what agencies can do to get a...
NOAA CIO: “Our vision is about agile”

NOAA CIO: “Our vision is about agile”

The National Oceanic and Atmospheric Administration has a slew of IT projects advancing simultaneously. Today, the agency is both a...
DOE seeks new maturity model for information security

DOE seeks new maturity model for information security

Kathleen Tighe, inspector general at the Department of Education, discussed vulnerabilities in DOE’s information security programs.
Comey firing & the cybersecurity leadership gap at federal agencies

Comey firing & the cybersecurity leadership gap at federal agencies

Nafeesa Syeed, national security and cyber reporter at Bloomberg, discussed the firing of FBI director James Comey and its impact...
Agencies await management agenda from the White House

Agencies await management agenda from the White House

Robert Shea, principal at Grant Thornton, discussed clues to President Trump’s management agenda buried in his executive order on cybersecurity.
FTC team builds IdentityTheft.gov to help consumers

FTC team builds IdentityTheft.gov to help consumers

Nat Wood, associate director of Consumer & Business Education at the Federal Trade Commission, discusses his teams’ work designing and...
White House issues cybersecurity executive order

White House issues cybersecurity executive order

Maria Horton, president and CEO at EmeSec, discusses how agencies should be implementing the White House’s new cybersecurity executive order.
Cybersecurity executive order aimed at federal networks, infrastructure

Cybersecurity executive order aimed at federal networks, infrastructure

Gregory Touhill (USAF, Ret.), former U.S. Chief Information Security Officer and recipient of the 2017 (ISC)² F. Lynn McNulty GISLA...
President Trump signs cybersecurity executive order

President Trump signs cybersecurity executive order

On Thursday, President Trump signed an executive order titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” The order...
DHS releases study on mobile device security

DHS releases study on mobile device security

Vincent Sritapan, program manager for the Homeland Security Advanced Research Projects Agency at DHS, discusses the agency’s latest study of...
What’s in a name? For NPPD, a new one could reflect changing priorities

What’s in a name? For NPPD, a new one could reflect changing priorities

Phyllis Schneck, managing director of cyber solutions at Promontory Financial Group and former deputy undersecretary for cybersecurity at the Department...
Systems engineering of cyber resilient and secure weapons

Systems engineering of cyber resilient and secure weapons

Linnie Haynesworth, general manager of cyber solutions at Northrop Grumman, discusses Defense Department’s new strategies for cyber resilient and secure...
Agencies grapple with shadow I.T. problem

Agencies grapple with shadow I.T. problem

Robert Bigman, president of 2BSecure, discusses how the federal government is grappling with it’s growing shadow I.T. problem.
Agencies await cybersecurity guidance from the White House

Agencies await cybersecurity guidance from the White House

Tony Hubbard, principal of cybersecurity services at KPMG, discussed the ways agencies are improving their cyber defense.
GSA working with DHS to streamline cyber procurement

GSA working with DHS to streamline cyber procurement

The General Services Administration is looking to streamline the way agencies are buying cyber solutions. Now, they will have access...
NIST looking for some fresh thinking in latest cyber framework

NIST looking for some fresh thinking in latest cyber framework

Comments on the next iteration of NIST’s cybersecurity framework are due on April 10th. It’s a landmark document with national...
The intelligence community & open source

The intelligence community & open source

Maj. Gen. Dale Meyerrose (USAF, ret.), president of the Meyerrose Group, discussed how open source technology is changing the way...
Making sense of agencies’ cyber priorities

Making sense of agencies’ cyber priorities

Ari Schwartz, managing director of cybersecurity services at Venable and former senior director of cybersecurity at the White House, discussed...
Spy powers at risk amid Trump controversy

Spy powers at risk amid Trump controversy

Sean Carberry, defense reporter at FCW, discusses the future of surveillance powers amid controversy surrounding the White House.
White House prioritizes cyber in FY18 budget outline

White House prioritizes cyber in FY18 budget outline

Ronald Marks, chair of the Intelligence Program at the Daniel Morgan Graduate School of National Security, discusses where the Trump...
Cybersecurity challenges at the Transportation Security Administration

Cybersecurity challenges at the Transportation Security Administration

Paul Morris, acting chief information security officer at the Transportation Security Administration, discusses the major cybersecurity challenges he’s facing and...
New cyber mandate for government contractors

New cyber mandate for government contractors

Maria Horton, president and CEO of EmeSec, discusses the new privacy and cybersecurity mandates for contractors.
State Department CIO targeting cloud, artificial intelligence

State Department CIO targeting cloud, artificial intelligence

State Department chief information officer Frontis Wiggins discussed the push to cut costs at the agency, reduce duplicative IT, and...