loader from loading.io

Ep. 124 Zero Trust: The Importance of Standardization & Consistency

Feds At The Edge by FedInsider

Release Date: 10/25/2023

Ep. 149 How Agencies can Adopt AI Swiftly and Securely show art Ep. 149 How Agencies can Adopt AI Swiftly and Securely

Feds At The Edge by FedInsider

By now, we have seen demonstrations of Artificial Intelligence summarizing content and even producing images. These are all great YouTube videos for a rainy Saturday afternoon, but what about the work of the government? With AI, one must begin with the data. When it comes to explaining how to leverage the petabytes of information, Karen Hall has a memorable quote. “Generative AI can unlock the knowledge trapped in data.” Her four guidelines for releasing this information are ·       Make sure the data is authoritative ...

info_outline
Ep. 148 Ai can set a new standard for customer service. show art Ep. 148 Ai can set a new standard for customer service.

Feds At The Edge by FedInsider

Everyone wants to pick up the phone and quickly get a human who has an immediate, correct, response. On the other hand, government institutions are characteristically understaffed and underfunded. The challenge is to apply modern technology to improve customer service within the allotted budgetary constraints. Amanda Nabours suggests that an answer that is one hundred percent correct must begin with the data used to provide answers. Data stores must prevent bias and privacy must be protected. Right now, her agency is in an exploratory phase, but she notes that one key aspect of a successful...

info_outline
Ep. 147 Challenges of Continuous Compliance with a Remote Workforce show art Ep. 147 Challenges of Continuous Compliance with a Remote Workforce

Feds At The Edge by FedInsider

Compliance is difficult enough in an air-conditioned data center; taking this essential concept to an austere geography that has spotty communications with the potential of bullets flying makes it almost impossible. This disruption of communication has a new term, Denied Disconnected Latent, or DLL. When communications are restored, they still must maintain compliance standards. Today we get some perspectives on how to manage this arduous task. From a design perspective, an agency may have a process where the developers who deploy the application may not be the ones who make end points...

info_outline
Ep. 146 The cyber wild west is still wild show art Ep. 146 The cyber wild west is still wild

Feds At The Edge by FedInsider

When the United States expanded westward, there was a surprise around every corner; in a similar vein, we see unlimited storage, fast speeds, and artificial intelligence creating a technical “wild west” environment for the federal government. Instead of a posse of Texas Rangers, we have a group of federal experts who have demonstrated their ability to corral malicious code and prevent robbers from stealing you blind. Marisol Cruz Cain from the GAO highlights some of the unpublicized aspects of AI. She mentions that its ability to rewrite code can make attribution difficult. In other...

info_outline
Ep. 145 Breaking the System into Tiny Little Pieces: a DoD approach to Zero Trust and micro segmentation. show art Ep. 145 Breaking the System into Tiny Little Pieces: a DoD approach to Zero Trust and micro segmentation.

Feds At The Edge by FedInsider

Tools | What to segment | floating data centers Four years ago, we needed to have panels define Zero Trust Architecture (ZTA). Today, the federal community recognizes the benefits of ZTA. That was the first hurdle; today, we have a panel that gives the “hows” of implementation, with a focus on micro-segmentation. When Angela Phaneuf worked at the US Army Factory called Kessel Run, they made themselves famous with innovation. Angela gives some practical tips on how to deploy ZTA. She explains that tools can assist in the move to micro-segmentation, however there are many. One approach...

info_outline
Ep. 144 Unlocking Modernization with AI Management: Meeting the Mission Imperative show art Ep. 144 Unlocking Modernization with AI Management: Meeting the Mission Imperative

Feds At The Edge by FedInsider

  Today we hear perspectives on how AI can assist federal agencies. Kevin Walsh from the GSA provides observations at several federal agencies; Pritha Mehra from the U.S. Post Office gives practical examples of deployment. The overriding consensus is that AI is not the panacea to solve all federal technology problems. However, it has promise but must be approached cautiously to use its power to meet your agency’s mission. Kevin Walsh from the GAO has seen his share of federal agency AI implementation. He has concluded that effectiveness varies from agency to agency. He cautions that...

info_outline
Ep. 143 Generative AI in Government show art Ep. 143 Generative AI in Government

Feds At The Edge by FedInsider

Every headline one reads sings the praises of  Generative Artificial Intelligence; today’s interview showcases some successes and also, some aspects that federal users should be aware of. The discussion includes concepts like hallucinations, test beds, and establishing trust. When Chat GPT was released, there was an explosion of people lauding its benefits. Finally, one can vacuum up previous knowledge and present it in many formats. What has not been highlighted is that there can be serious glitches in this approach and produce narratives where Napoleon was part of the American Civil...

info_outline
Ep. 142 Facing the Challenges AI Poses show art Ep. 142 Facing the Challenges AI Poses

Feds At The Edge by FedInsider

ChatGPT certainly has a great public relations department. It is portrayed as the answer to every conceivable problem for the beleaguered federal technology professional. Today, we sit down with a group of experts in what may be termed “Applied Artificial Intelligence.” We look at several aspects, including preparing your data for AI, the best applications for AI, and putting up guardrails to use AI safely. Mangala Kuppa from the Department of Labor indicates that every use case is unique. If one data set can yield valid results does not mean the results will be the same with another...

info_outline
Ep 141 Tapping into the Strategic Power of Data show art Ep 141 Tapping into the Strategic Power of Data

Feds At The Edge by FedInsider

Years ago, federal leaders would dream of getting the terabytes of data. The mechanics of collecting and processing have been solved; few thought that we would have more computing power than trusted information. Today’s discussion focuses on some of the risks in storing, sharing, and analyzing data. One of the reasons for this concern is the data generated by machines. Questions are being asked about how that data is collected and the method of collection. Let us assume the data is clean, the next step is to protect and share it. Some will suggest there has been too much focus on...

info_outline
Ep. 140 Letting in the Good Ones, keeping the Bad Ones out: Managing Access for Zero Trust show art Ep. 140 Letting in the Good Ones, keeping the Bad Ones out: Managing Access for Zero Trust

Feds At The Edge by FedInsider

Multifactor Authentication    |  Active Directory   | Access Brokers If one takes a cursory look at cybersecurity, one may conclude that Multifactor Authentication (MFA) may be the answer to cyber woes. That might have been true a couple of years ago, but malicious actors are adapting to every blockade put in their path. Today, we sat down with several identity management experts to get updated on current threats and best practices for reducing the attack surface for federal technology. MFA has a proven weak point. Researchers have discovered that when an...

info_outline
 
More Episodes

Complexity   Identity Credentials and Access Management  (ICAM)      Toxic Combinations

Napoleon Hill once said that a goal is a dream with a deadline.  When it comes to the federal transition to Zero Trust Architecture, the Office of Management and Budget outlines a path for implementing zero-trust architecture by 2024.  Today’s discussion gives federal practitioners terrific guidelines on how to accomplish that noble goal.

The group is a wonderful mix of federal experience, innovative leaders, and experts who were part of many initial network specifications.  During the discussion three topics were obvious:  how to manage complexity, identity, and unexpected combinations.

Complexity

During an exchange about “shiny new things” that seem to trap system managers, Josh Brodbent made a fantastic observation when he stated that complexity doesn’t always mean effectiveness. 

Drilling deeper into the concept of new technology, Frank Bruglio suggests some people will purchase a “shiny new toy” for the sole reason to check a box on a compliance requirement. 

ICAM

Bryan Rosensteel has spent his career in the world of federal identity management.  His experience leads him to believe that to fulfill the desired transition to zero-trust architecture, application developers must be taken into consideration.

His point is simple, if ICAM isn’t a part of application development, how can they assure that it will be compliant?  Bolting on compliance brings about delays and unneeded code revisions.  Bryan expands on this concept with his thoughts on abstract authentication and centralized structures.

Toxic Combinations

Frank Briguglio reminds us that managing Identity Credentials and Access Management must be understood at a much deeper level.  In the discussion, he revives the phrase “toxic combinations.”  This is a reference to granting privileges to users that can create risks in unexpected ways.

Automation has its limits, and humans must be part of the package when a federal agency commits to zero-trust-architecture.