Security Matters

Trump administration’s 90-day cyber plan

Trump administration’s 90-day cyber plan

Maria Horton, president and CEO at Emesec, discusses President-Elect Trump’s call for a 90-day plan to stop or slow cyber...
Trump calls for cyber plan in first 90 days

Trump calls for cyber plan in first 90 days

Tony Cole, vice president and global government chief technology officer at FireEye, discusses government “cyber hygiene” and how it can...
How agencies can come to terms with the certainty that they will be hacked

How agencies can come to terms with the certainty that they will be hacked

Coalfire’s Dave McClure discussed how agencies can come to terms with the certainty that they will be hacked.
Two cyber experts among list of Trump’s federal landing teams

Two cyber experts among list of Trump’s federal landing teams

Joseph Marks, cybersecurity correspondent for NextGov, discusses the two cyber experts appointed to President Elect Trump’s landing team.
Implications of double and triple wait times for background check investigations at OPM

Implications of double and triple wait times for background check investigations at OPM

Beth McGrath, director of Deloitte Consulting’s federal sector, discussed the implications of double and triple wait times for background check...
Trump administration and intelligence briefings

Trump administration and intelligence briefings

Gen. Michael Hayden (USAF, ret.), former director of both the National Security Agency and the CIA, discussed intelligence briefings being...
Recommendations from the Commission on Enhancing National Cybersecurity

Recommendations from the Commission on Enhancing National Cybersecurity

Robert Bigman, founder of 2BSecure and former chief information security officer at the CIA, discussed pending recommendations from the Commission...
CIOs push for power to stop cyber-deficient contracts

CIOs push for power to stop cyber-deficient contracts

Robert Klopp, CIO at the Social Security Administration, discusses CIO  cybersecurity and acquisition authority at federal agencies.
NIST releases new cybersecurity guidelines

NIST releases new cybersecurity guidelines

Ron Ross, fellow at the National Institute of Standards and Technology, discussed 800-160 — NIST’s newly-released cybersecurity guidance for federal...
The future of maritime security

The future of maritime security

Capt. David Adams (USN, ret.), deputy editor-in-chief at the U.S. Naval Institute, discussed the future of maritime security.
Cybersecurity & the presidential transition

Cybersecurity & the presidential transition

Phil Bond, President and CEO of Bond & Associates and former Undersecretary of Commerce for technology, discusses the critical nature of...
From the Nation’s Capital: Addressing the Critical Demand for Cyber Pros

From the Nation’s Capital: Addressing the Critical Demand for Cyber Pros

This special program presented by (ISC)² focuses on the many challenges facing the cyber community. Francis Rose explores these issues...
Protecting against the insider threat

Protecting against the insider threat

David Buckley, managing director at KPMG and former Inspector General at the CIA, discusses how an agency can protect itself...
Cyber and NASA

Cyber and NASA

Dennis Vander Tuig, CIO and director of IT and communications at NASA’s Goddard Space Flight Center, discusses the cybersecurity priorities for his...
How industry is embracing agile development

How industry is embracing agile development

Ellen Glover, executive vice president at ICF, discusses the way she is seeing industry embrace agile development.
DOT takes stock of IT

DOT takes stock of IT

The Department of Transportation is in the midst of a year-long move to the cloud. First, the agency spent months...
TSA’s approach to enterprise risk management

TSA’s approach to enterprise risk management

Marianne Roth, branch manager for the Office of the Chief Risk Officer at the Transportation Security Administration, discussed how her...
The shift from perimeter defense to risk management

The shift from perimeter defense to risk management

Austin Adams, vice president of public sector at Alfresco, discussed the federal government’s shift in cyber mindset — from perimeter...
The Federal Beat (Cyber Edition)

The Federal Beat (Cyber Edition)

Former senior CIA official Ronald Marks, Covata vice president Nikki Parker, and Lawfare blog managing editor Susan Hennessey joined Francis...
The security implications of Heath IT

The security implications of Heath IT

Rear Admiral Jamie Barnett (U.S. Navy retired), partner in the Cybersecurity Practice at the Venable law firm, discusses how to...
Federal CISO calls for a change in cyber mindset

Federal CISO calls for a change in cyber mindset

The first federal chief information security officer delivered his opening salvo to the federal community on Tuesday. Brig. Gen. Gregory...
The changing cyber threat landscape

The changing cyber threat landscape

Brigadier General Steve Spano, president of the Center for Internet Security, discusses the changing cyber threat landscape.
NIST and the growing issue of ‘security fatigue.’

NIST and the growing issue of ‘security fatigue.’

Mary Thefanos, computer scientist at the National Institute of Standards and Technology, discussed how most computer users experience ‘security fatigue.’
GSA and Dun & Bradstreet renegotiate deal

GSA and Dun & Bradstreet renegotiate deal

Hudson Hollister, executive director of the Data Coalition, discusses the General Services Administration’s deal with Dun & Bradstreet on the use...