Security Matters

Trump memo reorganizes National Security Council

Trump memo reorganizes National Security Council

Loren DeJonge Schulman, deputy director of studies at the Center for a New American Security, and James Carafano, vice president...
Impact of federal hiring freeze on national security

Impact of federal hiring freeze on national security

Richard Spires, CEO at Learning Tree International, discusses how CIOs in government can navigate the federal hiring freeze and work...
Trump delays signing of cybersecurity executive order

Trump delays signing of cybersecurity executive order

Mike Hettinger, president of Hettinger Strategy Group and Rich Beutel, principal at Cyrrus Analytics, discuss the details known so far...
OMB issues cybersecurity guidance to agencies

OMB issues cybersecurity guidance to agencies

Ari Schwartz, managing director of cybersecurity services at Venable and former director of cybersecurity at the White House, discusses OMB’s...
RSA Securing the Federal Mission

RSA Securing the Federal Mission

Sponsored: Cyber attacks on the federal government. How will security evolve? Steve Schmalz, Federal CTO for RSA discusses the issues facing...
Unclassified GEOINT is shaping the NGA enterprise

Unclassified GEOINT is shaping the NGA enterprise

There’s a relatively new spinoff inside the National Geospatial-Intelligence Agency called Pathfinder. The program is a GEOINT swat team of...
The concept of counter-GEOINT

The concept of counter-GEOINT

As the National Geospatial-Intelligence Agency tries to perfect the ratio between public-facing and top-secret GEOINT, they need to factor in...
NGA and GEOINT discipline at a flex point

NGA and GEOINT discipline at a flex point

The National Geospatial-Intelligence Agency is a unique organization guided by both the Department of Defense and the Director of National...
The Obama administration’s cyber legacy

The Obama administration’s cyber legacy

Joseph Marks, cybersecurity correspondent at NextGov, discusses the good and the bad of the Obama administration’s cyber legacy.
Trump administration seeks beefed up cyber presence

Trump administration seeks beefed up cyber presence

Rear Adm. Jamie Barnett (USN, ret.), partner in Venable’s cybersecurity practice, discussed the people tapped as cyber advisors to President-elect...
Trump administration’s 90-day cyber plan

Trump administration’s 90-day cyber plan

Maria Horton, president and CEO at Emesec, discusses President-Elect Trump’s call for a 90-day plan to stop or slow cyber...
Trump calls for cyber plan in first 90 days

Trump calls for cyber plan in first 90 days

Tony Cole, vice president and global government chief technology officer at FireEye, discusses government “cyber hygiene” and how it can...
How agencies can come to terms with the certainty that they will be hacked

How agencies can come to terms with the certainty that they will be hacked

Coalfire’s Dave McClure discussed how agencies can come to terms with the certainty that they will be hacked.
Two cyber experts among list of Trump’s federal landing teams

Two cyber experts among list of Trump’s federal landing teams

Joseph Marks, cybersecurity correspondent for NextGov, discusses the two cyber experts appointed to President Elect Trump’s landing team.
Implications of double and triple wait times for background check investigations at OPM

Implications of double and triple wait times for background check investigations at OPM

Beth McGrath, director of Deloitte Consulting’s federal sector, discussed the implications of double and triple wait times for background check...
Trump administration and intelligence briefings

Trump administration and intelligence briefings

Gen. Michael Hayden (USAF, ret.), former director of both the National Security Agency and the CIA, discussed intelligence briefings being...
Recommendations from the Commission on Enhancing National Cybersecurity

Recommendations from the Commission on Enhancing National Cybersecurity

Robert Bigman, founder of 2BSecure and former chief information security officer at the CIA, discussed pending recommendations from the Commission...
CIOs push for power to stop cyber-deficient contracts

CIOs push for power to stop cyber-deficient contracts

Robert Klopp, CIO at the Social Security Administration, discusses CIO  cybersecurity and acquisition authority at federal agencies.
NIST releases new cybersecurity guidelines

NIST releases new cybersecurity guidelines

Ron Ross, fellow at the National Institute of Standards and Technology, discussed 800-160 — NIST’s newly-released cybersecurity guidance for federal...
The future of maritime security

The future of maritime security

Capt. David Adams (USN, ret.), deputy editor-in-chief at the U.S. Naval Institute, discussed the future of maritime security.
Cybersecurity & the presidential transition

Cybersecurity & the presidential transition

Phil Bond, President and CEO of Bond & Associates and former Undersecretary of Commerce for technology, discusses the critical nature of...
From the Nation’s Capital: Addressing the Critical Demand for Cyber Pros

From the Nation’s Capital: Addressing the Critical Demand for Cyber Pros

This special program presented by (ISC)² focuses on the many challenges facing the cyber community. Francis Rose explores these issues...
Protecting against the insider threat

Protecting against the insider threat

David Buckley, managing director at KPMG and former Inspector General at the CIA, discusses how an agency can protect itself...
Cyber and NASA

Cyber and NASA

Dennis Vander Tuig, CIO and director of IT and communications at NASA’s Goddard Space Flight Center, discusses the cybersecurity priorities for his...