Cybersecurity

Intelligence community reviews foreign influence in government

Intelligence community reviews foreign influence in government

Brig. Gen. Gregory Touhill (USAF Ret.), president of Cyxtera Federal Group, discusses what the intelligence community is looking for in...
U.S. accuses China of violating anti-hacking deal

U.S. accuses China of violating anti-hacking deal

Ari Schwartz, managing director of cybersecurity services at Venable, discusses difficulties with keeping international anti-hacking agreements afloat, and the importance...
Entrepreneurial Government

Entrepreneurial Government

Data Analytics This program focuses on the internet of things, sensors and data-driven decision making, how data is helping agencies...
Cyber vulnerabilities in supply chain management

Cyber vulnerabilities in supply chain management

Robert Bigman, former chief information security officer at the Central Intelligence Agency and founder of 2BSecure, discusses how widespread cyber...
CESER office works to improve energy cybersecurity

CESER office works to improve energy cybersecurity

Karen Evans, Assistant Secretary of Energy for Cybersecurity, Energy Security, and Emergency Response, discusses her office’s authorities, and working with...
DoD considers adding new cybersecurity measurements for industry

DoD considers adding new cybersecurity measurements for industry

Stan Soloway, president and CEO of Celero Strategies, discusses the Department of Defense possibly judging industry members on cybersecurity practices...
DOE CIO outlines cybersecurity priorities

DOE CIO outlines cybersecurity priorities

Max Everett, chief information officer at the Energy Department, discusses how the agency plans to modernize their email using money...
GovLoop’s Talking Transformation: Cyber Trends

GovLoop’s Talking Transformation: Cyber Trends

Watch this show on-demand now. The U.S is on the cutting edge of technology. Find out what’s on the horizon...
5th Annual Government IT Sales Summit

5th Annual Government IT Sales Summit

Location: Hyatt Regency Reston (1800 Presidents Street, Reston, Va 20190) Reston, Va. | November 15, 2018 Success in business is...
Tech Leadership Series – Cyber

Tech Leadership Series – Cyber

Watch this show on-demand now. Host Francis Rose explores some of the key issues on Cyber. The tenth installment focuses...
White House releases new cybersecurity strategy

White House releases new cybersecurity strategy

Christopher Painter, Former Coordinator for Cyber Issues at the State Department and Ari Schwartz, managing director of cybersecurity services at...
Innovation That Works: Blockchain & Cybersecurity

Innovation That Works: Blockchain & Cybersecurity

Watch the program on-demand now. Co-hosts Francis Rose and Adewale Omoniyi discuss what the government is working on to harness...
Report: VA stopped publishing breach reports for 9 months

Report: VA stopped publishing breach reports for 9 months

Joseph Marks, senior correspondent at NextGov, discusses his article about the lack of quarterly breach reports from the Department of...
Implementing emerging technology at scale in cyber security

Implementing emerging technology at scale in cyber security

Identiv CEO Steve Humphreys and King & Union CEO John Cassidy discuss DARPA’s Cyber Hunting at Scale contract, and what...
Lawmaker proposes government-wide cybersecurity watchdog

Lawmaker proposes government-wide cybersecurity watchdog

Brig. Gen. Gregory Touhill (USAF Ret.) president of Cyxtera Federal Group, discusses the proposal to have a cyber inspector general,...
Potential applications of AI in the cyber area

Potential applications of AI in the cyber area

Robert Bigman, Former CISO at the Central Intelligence Agency and founder of 2BSecure, discusses using Artificial Intelligence to detect malware...
The Federal Beat – August 17, 2018

The Federal Beat – August 17, 2018

Federal News Radio Executive Editor Jason Miller and Joseph Marks, senior correspondent at NextGov, discuss some of this week’s top...
DHS launches new national risk management center

DHS launches new national risk management center

Ari Schwartz, managing director of cybersecurity services at Venable, discusses the new Department of Homeland Security risk management center, and...
Race for tech supremacy in the defense sector

Race for tech supremacy in the defense sector

Michael Hermus, former Department of Homeland Security CTO and CEO & Managing Partner at Revolution Four Group, discusses the changing...
Priorities for DLA’s Cyber Resilience Integration Initiative

Priorities for DLA’s Cyber Resilience Integration Initiative

Linus Baker, cybersecurity director at the Defense Logistics Agency, discusses the new cyber programs at the organization, and what they...
Government cyber leaders facing a ‘fog of more’

Government cyber leaders facing a ‘fog of more’

Tony Sager, senior vice president of the Center for Internet Security, discusses the increasingly complicated cybersecurity landscape, and the “fog...
Federal Cybersecurity Risk Determination Report & Action Plan

Federal Cybersecurity Risk Determination Report & Action Plan

Tony Scott, senior data privacy & cybersecurity adviser at Squire Patton Boggs, discusses the new report outlining how agency cybersecurity...
The Federal Beat –  June 17, 2018

The Federal Beat – June 17, 2018

NextGov Senior Editor Aaron Boyd, Washington Technology Editor Nick Wakeman and Billy Mitchell, Managing Editor at FedScoop, discuss the latest...
Tech Leadership Series – IoT

Tech Leadership Series – IoT

Watch on-demand now. Host Francis Rose explores some of the key issues on IoT. This sixth installment focuses on the...
DHS releases cybersecurity strategy

DHS releases cybersecurity strategy

Ari Schwartz, managing director of cybersecurity services at Venable, discusses the new Department of Homeland Security cyber outline and the...
Lawmakers look to save White House cyber coordinator role

Lawmakers look to save White House cyber coordinator role

Tony Cole, chief technology officer at Attivo Networks, discusses congressional efforts to save the position of White House Cybersecurity Coordinator...
GovLoop’s Talking Transformation: Cybersecurity

GovLoop’s Talking Transformation: Cybersecurity

Watch on-demand now. The U.S is on the cutting edge of technology. Find out what’s on the horizon from government...
“Hack Your State Dept” bill to run agency bug bounties

“Hack Your State Dept” bill to run agency bug bounties

Ari Schwartz, managing director of cybersecurity services at Venable, discusses a bill in Congress that would make the State Department...
Challenges in government cyber risk mitigation

Challenges in government cyber risk mitigation

George DeLisle, federal sales director at Varonis, discusses the White House’s planned action on cybersecurity, and how industry is interested...
CLOUD Act passes in omnibus spending bill

CLOUD Act passes in omnibus spending bill

FCW Staff Writer Derek Johnson and Joseph Marks, Cybersecurity Correspondent at Nextgov, discuss the latest cybersecurity stories out of Congress,...
DHS announces new research and technology guides

DHS announces new research and technology guides

Douglas Maughan, director of the Cyber Security Division at the DHS Science and Technology Directorate, discusses guides that his agency...
Common themes in agency cyber risk mitigation

Common themes in agency cyber risk mitigation

Jeanette Manfra, Assistant Secretary of the Office of Cybersecurity & Communications at the Department of Homeland Security, discusses how agencies...
Cyberactivity consequences for the Defense Industrial Base

Cyberactivity consequences for the Defense Industrial Base

While the world’s eyes are on North Korea’s nuclear ambitions, their cyber program has been wreaking havoc. Last year, North...
Agencies get innovative to recruit cyber talent

Agencies get innovative to recruit cyber talent

Federal Chief Information Officers are always looking to expand their teams by hiring the best cybersecurity talent. However, finding this...
Data Crunch: Cyber spending

Data Crunch: Cyber spending

In the proposed FY19 budget the White House recently sent to Congress, an item in the Department of Defense’s section...
DoD to set high standard for industry cybersecurity

DoD to set high standard for industry cybersecurity

At West 2018, Deputy Secretary of Defense Patrick Shanahan set an ultimatum for defense contractors: secure your data or lose...
The State of Defense and National Security: Outlook 2018

The State of Defense and National Security: Outlook 2018

Watch on demand now. Join us for an in-depth discussion of the impact of technology is having on national security...
U.S. blames North Korea for WannaCry cyberattack

U.S. blames North Korea for WannaCry cyberattack

Rear Adm. Jamie Barnett (USN, ret.), a partner in Venable’s cybersecurity practice, discusses comments from Department of Homeland Security advisor...
DoD cyber & risk management

DoD cyber & risk management

Tony Hubbard, principal of cybersecurity services at KPMG, discusses the Pentagon’s use of a risk management framework to cut cyber...
Common threads to international cyber diplomacy

Common threads to international cyber diplomacy

Christopher Painter, former coordinator for cyber issues at the State Department, discusses the importance of international cyber diplomacy.
IG report finds OPM still struggling with cyber

IG report finds OPM still struggling with cyber

Michael Esser, assistant inspector general for audits at the Office of Personnel Management, discusses the findings of their Federal Information...
Hundreds attend federal cyber & tech hiring fair

Hundreds attend federal cyber & tech hiring fair

NextGov Cybersecurity correspondent Joseph Marks discusses a handful of headlines from this week, including the government first ever cyber hiring...
Cybersecurity priorities at the Health & Human Services Department

Cybersecurity priorities at the Health & Human Services Department

At the 2017 ACT-IAC Executive Leadership Conference Christopher Wlaschin, chief information security officer at the Health & Human Services Department,...
Kaspersky & the future of government cybersecurity

Kaspersky & the future of government cybersecurity

James Norton, founder and president at Play-Action Strategies, and Sean Kanuck, director of future conflict and cybersecurity at the International...
The growth of artificial intelligence in cybersecurity

The growth of artificial intelligence in cybersecurity

Tony Hubbard, principal of cybersecurity services at KPMG, discusses the use of AI in the cyber realm — who’s using...
Administration, agencies focus on cyber information sharing

Administration, agencies focus on cyber information sharing

Brig. Gen. Gregory Touhill (USAF, ret.), president of Cyxtera Federal Group, discusses cyber information sharing between industry and government.
Priorities for Army cyber and electronic warfare

Priorities for Army cyber and electronic warfare

Maj. Gen. John Morrison, commander of the Army Cyber Center of Excellence and Fort Gordon, discusses the Army’s evolving cyber...
DOJ’s strategy on IT modernization

DOJ’s strategy on IT modernization

Melinda Rogers, chief information security officer at the Department of Justice, discusses DOJ’s strategy for modernization, system consolidation, shared services,...
The future of AI in federal cybersecurity

The future of AI in federal cybersecurity

Ari Schwartz, managing director of cybersecurity services for Venable, and Sam Curry, chief security officer for Cybereason, discuss some of...
Risks of centralizing government cybersecurity

Risks of centralizing government cybersecurity

Phyllis Schneck, former deputy undersecretary for cybersecurity and communications at the Department of Homeland Security, discusses the push at some...
Obama’s cyber czar calls for ‘a mix’ of centralized security

Obama’s cyber czar calls for ‘a mix’ of centralized security

Michael Daniel, president of the Cyber Threat Alliance and former White House cybersecurity coordinator, discusses the state of cyber collaboration...
Smart IoT security as the path forward for data-centric government

Smart IoT security as the path forward for data-centric government

For government, the paradigm shift to an Internet of Things is already underway. The lynchpin is sensors — and lots...
OMB satisfied with cybersecurity EO compliance

OMB satisfied with cybersecurity EO compliance

President Trump’s cybersecurity executive order called for agency heads to create a risk management report within 90 days — using the...
Crafting a successful federal cyber recipe

Crafting a successful federal cyber recipe

Brig. Gen. Gregory Touhill, president of Cyxtera Federal Group and former U.S. chief information security officer, discusses how defense and...
An enterprise risk management approach to cybersecurity

An enterprise risk management approach to cybersecurity

Richard Spires, CEO of Learning Tree International, discusses the emerging role of enterprise risk management in maintaining the safety of...
House DHS authorization bill contains significant cyber provisions

House DHS authorization bill contains significant cyber provisions

Ron Marks, chair of the intelligence program at the Daniel Morgan Graduate School of National Security, discusses cybersecurity reforms contained...
Federal agencies seek to improve cyber posture

Federal agencies seek to improve cyber posture

Kevin Kelly, CEO at LGS Innovations and Wayne Lewandowski, area vice president of Federal at Thales e-Security, discuss the impact...
Mapping an approach to cyber procurement

Mapping an approach to cyber procurement

Chris Cummiskey, CEO of Cummiskey Strategic Solutions and former acting undersecretary at the Department of Homeland Security, discussed cyber procurement...
Bridging the gap between compliance and security

Bridging the gap between compliance and security

Ira Hobbs, former deputy assistant secretary for IT at the Treasury Department, discussed what agencies can do to get a...
NOAA CIO: “Our vision is about agile”

NOAA CIO: “Our vision is about agile”

The National Oceanic and Atmospheric Administration has a slew of IT projects advancing simultaneously. Today, the agency is both a...
DOE seeks new maturity model for information security

DOE seeks new maturity model for information security

Kathleen Tighe, inspector general at the Department of Education, discussed vulnerabilities in DOE’s information security programs.
White House initiatives driving workforce priorities at DHS

White House initiatives driving workforce priorities at DHS

Roland Edwards, deputy chief human capital officer at the Department of Homeland Security, discussed how the government reorganization memo and...
Comey firing & the cybersecurity leadership gap at federal agencies

Comey firing & the cybersecurity leadership gap at federal agencies

Nafeesa Syeed, national security and cyber reporter at Bloomberg, discussed the firing of FBI director James Comey and its impact...
Agencies await management agenda from the White House

Agencies await management agenda from the White House

Robert Shea, principal at Grant Thornton, discussed clues to President Trump’s management agenda buried in his executive order on cybersecurity.
Cybersecurity executive order aimed at federal networks, infrastructure

Cybersecurity executive order aimed at federal networks, infrastructure

Gregory Touhill (USAF, Ret.), former U.S. Chief Information Security Officer and recipient of the 2017 (ISC)² F. Lynn McNulty GISLA...
President Trump signs cybersecurity executive order

President Trump signs cybersecurity executive order

On Thursday, President Trump signed an executive order titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” The order...
FedRAMP aims to bridge the gap between government and industry

FedRAMP aims to bridge the gap between government and industry

FedRAMP director Matt Goodrich discussed the purpose behind FedRAMP Connect, the announcement that seven cloud vendors have received prioritization, and...
What’s in a name? For NPPD, a new one could reflect changing priorities

What’s in a name? For NPPD, a new one could reflect changing priorities

Phyllis Schneck, managing director of cyber solutions at Promontory Financial Group and former deputy undersecretary for cybersecurity at the Department...
Is Your Agency Blind to Cyber Risks?

Is Your Agency Blind to Cyber Risks?

Here is David Otto, CISSP, High Value Asset Program Manager for DHS, Federal Network Resilience and Clark Campbell, Vice President...
Agencies await cybersecurity guidance from the White House

Agencies await cybersecurity guidance from the White House

Tony Hubbard, principal of cybersecurity services at KPMG, discussed the ways agencies are improving their cyber defense.
GSA working with DHS to streamline cyber procurement

GSA working with DHS to streamline cyber procurement

The General Services Administration is looking to streamline the way agencies are buying cyber solutions. Now, they will have access...
Making sense of agencies’ cyber priorities

Making sense of agencies’ cyber priorities

Ari Schwartz, managing director of cybersecurity services at Venable and former senior director of cybersecurity at the White House, discussed...
OMB: Federal agencies are doing a better job at securing their networks

OMB: Federal agencies are doing a better job at securing their networks

Rear Adm. Jamie Barnett (USN, ret.), partner in the cybersecurity practice at Venable, discussed the results of this year’s FISMA...
The importance of personnel to national cybersecurity

The importance of personnel to national cybersecurity

Earl Crane, CEO of Emergent Network Defense and former White House director of federal cybersecurity policy, discussed an op-ed he...
Impact of federal hiring freeze on national security

Impact of federal hiring freeze on national security

Richard Spires, CEO at Learning Tree International, discusses how CIOs in government can navigate the federal hiring freeze and work...
Trump delays signing of cybersecurity executive order

Trump delays signing of cybersecurity executive order

Mike Hettinger, president of Hettinger Strategy Group and Rich Beutel, principal at Cyrrus Analytics, discuss the details known so far...
RSA Securing the Federal Mission

RSA Securing the Federal Mission

Sponsored: Cyber attacks on the federal government. How will security evolve? Steve Schmalz, Federal CTO for RSA discusses the issues facing...
The Obama administration’s cyber legacy

The Obama administration’s cyber legacy

Joseph Marks, cybersecurity correspondent at NextGov, discusses the good and the bad of the Obama administration’s cyber legacy.
Trump administration’s 90-day cyber plan

Trump administration’s 90-day cyber plan

Maria Horton, president and CEO at Emesec, discusses President-Elect Trump’s call for a 90-day plan to stop or slow cyber...
The Future of Government CyberSecurity

The Future of Government CyberSecurity

Here is Tom Ruff, VP of Solutions Sales at Akamai discusses the future of Government Cyber Security. During 2015, federal...
Trump calls for cyber plan in first 90 days

Trump calls for cyber plan in first 90 days

Tony Cole, vice president and global government chief technology officer at FireEye, discusses government “cyber hygiene” and how it can...
Lessons learned by presidential fellows

Lessons learned by presidential fellows

Rosetta Carrington, senior contact center advisor at the Department of Veterans Affairs, and Clifton Triplett, senior cybersecurity and IT advisor...
Recommendations from the Commission on Enhancing National Cybersecurity

Recommendations from the Commission on Enhancing National Cybersecurity

Robert Bigman, founder of 2BSecure and former chief information security officer at the CIA, discussed pending recommendations from the Commission...
NIST releases new cybersecurity guidelines

NIST releases new cybersecurity guidelines

Ron Ross, fellow at the National Institute of Standards and Technology, discussed 800-160 — NIST’s newly-released cybersecurity guidance for federal...
Federal CISO calls for a change in cyber mindset

Federal CISO calls for a change in cyber mindset

The first federal chief information security officer delivered his opening salvo to the federal community on Tuesday. Brig. Gen. Gregory...
Cyber plays small role in first presidential debate, looms large for next administration

Cyber plays small role in first presidential debate, looms large for next administration

Tony Cole, vice president and global government chief technology officer for FireEye, discussed cybersecurity challenges facing the next administration.
The Federal Beat

The Federal Beat

FedScoop tech editor Greg Otto, NextGov executive editor Camille Tuutti, and Bloomberg cybersecurity reporter Jordan Robertson joined Francis for a...
Government Matters (Full Show) – August 21, 2016

Government Matters (Full Show) – August 21, 2016

Sunday on Government Matters: Austin Price, innovation operations manager for the Unified Shared Services Management Office at the General Services...
How effective are report cards in measuring cyber success?

How effective are report cards in measuring cyber success?

Robert Bigman, founder of 2BSecure and former Chief Information Security Officer at the CIA, talks about the effectiveness of report...
Plans to elevate U.S. Cyber Command

Plans to elevate U.S. Cyber Command

Rear Adm. Jamie Barnett (USN, Ret.), co-chair of the telecommunications group and cybersecurity practice at Venable, discussed the future of...
DARPA’s cyber grand challenge

DARPA’s cyber grand challenge

FedScoop technology editor Greg Otto explained why the Defense Advanced Research Projects Agency, or DARPA, is searching for cybersecurity solutions...
TSP’s 5-year plan focuses on cybersecurity

TSP’s 5-year plan focuses on cybersecurity

Kim Weaver, director of external affairs at the Federal Retirement Thrift Investment Board, discussed a strategy shift for the Thrift...
Investigation into Library of Congress cyber attack

Investigation into Library of Congress cyber attack

Nikki Parker, vice president of growth & strategy at Covata, discussed the investigation into a cyber attack on the Library...
Sorting through a ‘Cambrian Explosion’ of cyber solutions

Sorting through a ‘Cambrian Explosion’ of cyber solutions

Bob Gourley, former chief technology officer at the Defense Intelligence Agency and co-founder of Cognitio, offered tips to federal agencies...
DOJ OIG: FBI cyber threat review made progress, still needs work

DOJ OIG: FBI cyber threat review made progress, still needs work

Department of Justice Inspector General Michael Horowitz discussed cyber protections at the FBI and concerns about the agency’s case management...
DoD cyber and workforce priorities

DoD cyber and workforce priorities

Terry Halvorsen, Chief Information Officer of the Defense Department, talked about the department’s goals and biggest challenges in building out it’s...
Recruiting cyber talent to the DoD

Recruiting cyber talent to the DoD

According to Federal News Radio, Chris Lynch — director of digital services at the Defense Department — said “it’s been...
Report suggests federal cyber security has a long way to go

Report suggests federal cyber security has a long way to go

Last June, the Office of Personnel Management announced that the background records of current, former, and prospective federal workers and...
What are the ‘rules of engagement’ for a cyber conflict?

What are the ‘rules of engagement’ for a cyber conflict?

Rear Adm. Jamie Barnett (ret.), partner in Venable’s cybersecurity practice, discussed the lack of set ‘rules of engagement’ for cyber...
Government Matters (Full Show) – July 13, 2016

Government Matters (Full Show) – July 13, 2016

On Wednesday’s edition of Government Matters: Rear Adm. Jamie Barnett (ret.), partner in Venable’s cybersecurity practice, discussed the lack of...
Rule 41: The latest front in privacy versus security

Rule 41: The latest front in privacy versus security

Last month, the U.S. Supreme Court approved changes to Rule 41 — a part of the criminal code that governs...