Ep. 274 How Fortreum can help protect executives
Release Date: 09/15/2025
Federal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? In a recent report from Microsoft, they share that foreign adversaries are increasing attacks on American infrastructure. One variation is that they will not penetrate systems and attack, but they will steal credentials and install code to act in stealth mode. This code can hide for years and be deployed when the antagonist wants. Today, we sat down with Travis Roseik from Rubrik to try to find some options for defending against this hidden attack. Let us say an agency has improved its resistance to foreign...
info_outlineFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? The federal government recognizes that threats are multiplying at an exponential level. In fact, in October 2025, CISA released a free vulnerability scanner, and 10,000 organizations have signed up. Today, CISA is at its current capacity. Today, we examine solutions from a successful startup called CrunchAtlas. One of the co-founders, Ben Fabrelle, will share with the audience his experience in threat hunting in the federal government and why he combined with another veteran to form a company that can assist...
info_outlineFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Ep. 281 How Zero Trust Automation Helps Federal Agencies do More with Less Connect to John Gilroy on LinkedIn Want to listen to other episodes? As this interview was recorded, the federal government was in the middle of a shutdown. Hundreds of pundits have given interviews about the politics of the situation; very few have looked at the impact on cybersecurity during a phase of workforce reduction. Today, we sat down with Gary Barlet, the Public Sector CTO at Illumio, to see whether Zero Trust can help the federal government bridge this short personnel gap. Barlet begins by...
info_outlineFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? Today, we sat down with Chris Wysopal from Veracode to talk about how to leverage the power of AI to increase productivity in federal systems. It seems like every headline you read talks about AI speeding up the process of writing code. However, there may be mixed messages here. Wysopan read some academic reports that talked about vulnerabilities being introduced in human code as well as AI code. Because this has been a concern for a while, He initiated the Gen AI Code Security report. They examined a wide...
info_outlineFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
A recent study from Carnegie Mellon University is titled "AI Agents Fail at Office Tasks Nearly 70% of the Time." Federal agencies are adopting Agentic AI for the efficiency it can deliver. Unfortunately, many do not realize that Agentic AI is prone to operational risks, ranging from technical glitches to legal complications to accidental database deletion. When Agentic AI causes problems at a federal agency, there can be lives at stake. Today, we sat down with Travis Rosiek, Rubrik's Public Sector Chief Technology Officer. During the interview, he explores the federal challenges of...
info_outlineFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? Elastic has been around since 2012 and has been gradually gaining traction in the commercial world. In fact, Elastic has recently signed agreements with Nvidia and Google to improve integration with its distributed search analysis. All this assists with AI search and observability. Today, we sat down with Chris Thompson from Elastic to highlight how commercial success can be applied to the federal world. Looking back at his decades of work with federal agencies, he sees one of the problems in acquisition....
info_outlineFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? MongoDB has spent years earning a formidable reputation in the developer world; today, we will unpack some of its capabilities for project managers and federal leaders so they can understand where MongoDB may fit in their stack. Conventional wisdom is that MongoDB is a flexible open-source database. Although that is true, this does not do justice to some characteristics that will appeal to the federal audience. ONE: An agency may have restrictions on where the cloud is not suitable for storage. Because...
info_outlineFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? Many listeners have become so familiar with AI that they may have assumed it has been around for decades. Today, we sat down with Will Angel from Excella to explore the application of AI to federal technology from a more nuanced perspective. We dive into three main aspects of AI: challenges of integrating AI services, Model Context Protocol, and security considerations with agentic systems. Challenges: No company has grown as fast as ChatGPT; in fact, it is the fastest-adopted consumer application...
info_outlineFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? Sometimes, the plow must go deeper. Current approaches to Zeer Trust implementation can leave gaps in security. Today, we sat down with Akamai’s Mike Colson to discuss the concept of combining Identity Credential Access Management with Least Permissive Trust. Setting the stage, Mike Colson details some of the challenges in the varying kinds of Zero Trust that are being applied in the Federal Government. The standard way of implementing ICM can result in assigning more resources than necessary, leading to...
info_outlineFederal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
Connect to John Gilroy on LinkedIn Want to listen to other episodes? The impact of AI in software development in the federal government is so pervasive that, in July of 2025, the President of the United States released a White House AI Action Plan. Today, we sat down with Bob Stevens from GitLab to put this development into perspective, examine some use cases, and suggest methods that federal agencies can use to prepare for this technological shift. What precipitated the initiative is the recognition that change is occurring so rapidly in the world of software development...
info_outlineConnect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/
Want to listen to other episodes? www.Federaltechpodcast.com
It is difficult to pinpoint an exact number, but some statistics show an executive is five times more likely to be attacked than a regular employee. It makes sense. If you receive a suspicious email from a fellow employee, do not respond. However, if you receive an email from the CEO, you are more likely to react more aggressively.
In today's interview, Richard Fleeman and Ricky Freeman from Fortreum Labs discussed the increased risk executives face, citing a 74% human error rate in breaches.
How do malicious actors get personal information on an executive? Sometimes, leaders are too active on social media and, for example, post when they are on vacation. If an employee gets fooled, he may transfer assets online.
Okay, we know ransomware is on the rise drastically, and companies are vulnerable – what can an executive do to prevent this activity?
Richard Fleeman observes that once the money is transferred, it is exceedingly difficult to find a resolution. He suggests that prevention is the best approach.
Start with social media and see if you are revealing your email or confidential information. Some call this oversharing. Multi Factor Authentication is a terrific way to limit access to your accounts.
People often use the same password. Humans tend to repeat passwords. "Password spraying" can be used to break into accounts.
Fortreum offers a service to help executives avoid these common pitfalls. They can start with publicly available data and then move onto the dark web.
Ricky Freeman notes that attacks like the OMB breach often result in data for sale on the dark web. He has developed tools that enable the scraping of the dark web to determine if an executive can compromise sensitive information.
Hard to expunge – easier to opt out Dark web. Even if your compromised information is extant on the dark web, you may not be able to do anything about it.
Fortreum's services include manual testing, attack surface analysis, and dark web scraping to identify vulnerabilities and provide recommendations.
You can get an idea of your vulnerability by taking advantage of guides to see if you are exposed.