Ep. 147 Challenges of Continuous Compliance with a Remote Workforce
Feds At The Edge by FedInsider
Release Date: 05/02/2024
Feds At The Edge by FedInsider
AI is just another tool in the technology market, only becoming a powerful resource when agencies learn how to best utilize it to reach mission goals. This week on Feds-At-The Edge we explore several insights on deploying AI effectively for the federal government landscape. Caroline Carusone, Deputy CIO for NRC, discusses AI’s potential in identifying security risks and solving complex engineering challenges, like improving atomic reactor designs. Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI's role in handling massive datasets, enhancing...
info_outline Ep. 175 Reprioritizing Mission Delivery and Zero Trust Security in SaaSFeds At The Edge by FedInsider
Software as a Service (SaaS) is incredibly enticing with its ease and affordability, however despite the heavy lifting being done for you, the responsibility of protecting your data and network remains in your hands. This week on Feds-At-The Edge we sit down with Eoghan Casey, VP of Cybersecurity Strategy & Product Development for Own Company, who highlights essential security practices for agencies using Software as a Service (SaaS). >> Understanding data visibility- What's sensitive and what’s not >> The importance of continuous monitoring and backing up...
info_outline Ep. 174 How to Succeed with Zero Trust and AI, Look to Cultural ChangeFeds At The Edge by FedInsider
If you’ve tuned before then you’ve heard the three magic words; People, process, technology. While technology often takes the spotlight, there’s a reason why “people” come first. This week on Feds-At-The Edge we explore the cultural shifts agencies are prioritizing to achieve zero trust. Jothi Dugar, CISO at NIH’s Center for Information Technology emphasizes the age-old advice, communication is key. Federal leaders should speak a language all stakeholders understand, and responsibility should be placed in the hands of the many and not the hands of the select...
info_outline Ep. 173 Using Micro segmentation to ease the Weight of ComplianceFeds At The Edge by FedInsider
In today’s data-driven world, network systems are under immense pressure to handle increasing loads of data while staying compliant in a rapidly evolving landscape. How can agencies effectively secure their systems when every little nook and cranny requires oversight? This week on Feds-At-The Edge we explore how microsegmentation is emerging as a vital strategy for agencies working toward a robust zero-trust architecture. Rob Thorne, CISO of U.S. Immigration and Customs Enforcement, highlights how complex systems often have hidden connections unknown to administrators,...
info_outline Ep. 172 DoD Embracing Continuous MonitoringFeds At The Edge by FedInsider
The concept of "continuous" protection, inspired by continuous software development, is gaining traction among federal tech leaders in response to rising cyber-attacks. This week on Feds At the Edge, we sit down with subject matter experts who provide guidance for transitioning from the basic “Authority to Operate” snapshot in time to a “Continuous Authority to Operate.” Col Bryan A Eovito, Commanding Officer, for the Marine Corps Cyber Operations Group, emphasized the value of establishing a baseline for comparison to detect discrepancies, warning that...
info_outline Ep. 171 Focus on Cyber ResiliencyFeds At The Edge by FedInsider
Your agency will be attacked. Even if we look at the most conservative estimates, a company like shows 32,211 attacks on federal agencies in 2023. The conclusion is obvious: you will be attacked and must have a way to remediate the problem. Today, we sat down with three experienced cyber professionals to hear suggestions on improving federal cyber security resilience. Russel Marsh from the National Nuclear Security Administration observes that federal employees may work 9 am to 5 pm every day, but malicious actors do not. The best practice here is to have a checklist of what to do in an...
info_outline Ep. 170 Election Security: Protecting the Foundation of DemocracyFeds At The Edge by FedInsider
This week on Feds At the Edge, sit down with an industry expert and state election officials from Pennsylvania, Florida, and Georgia to focus on election security challenges and solutions. Challenges: >> Traditional threats like disinformation and denial-of-service (DoS) attacks continue to be significant. There is also a growing concern about the physical threats faced by election officials, leading to high turnover rates. In Pennsylvania, 2/3 of officials have left their positions, resulting in an influx of new, less experienced staff. Solutions: >>...
info_outline Ep. 169 How Digital Playbooks Propel Federal ModernizationFeds At The Edge by FedInsider
In a world of rapid change and threat, organizations need to be ready and waiting with a plan. One good approach some are taking to navigate an ever-evolving landscape is to lean on a “digital playbook.” Customized to each situation and the unique and individual needs agencies big and small have, these playbooks could make the difference between a scramble and a smooth transition. This week on Feds At the Edge, leaders from the Federal and commercial sectors discuss the integration of digital playbooks in federal modernization, emphasizing the blend of people, processes, and...
info_outline Ep. 168 Metrics that Matter for Critical Infrastructure Cyber ResilienceFeds At The Edge by FedInsider
The 2021 Colonial Pipeline incident has stood in history as a prime example of the importance of cyber resilience for critical infrastructure. This week on Feds At the Edge, we delve into the call-to-action events like this have created for agencies everywhere and the resources available for even the smallest entities. Cheri Caddy, Senior Technical Advisor for Cybersecurity at the US Department of Energy, talks about resources like CISA & NIST, but suggests that private companies should also build ties with local FBI offices. Brendan Peter, VP, Global Government...
info_outline Ep. 167 Making Progress in the Incident Response and ReportingFeds At The Edge by FedInsider
When a network is attacked, analysts return to the logs to gain an understanding of where the point of vulnerability was, which makes keeping these records a crucial tool in cyber resilience. However, a lack of staff, poor existing systems, and limitations on information sharing in our increasingly complex and hybrid landscape could prevent agencies from keeping their records reliable and up-to-date. This week on Feds At the Edge, leaders from the Federal and commercial sectors share they ways they’ve been able to overcome the hurdles they face when logging events. Tate...
info_outlineFor the video of this podcast: Challenges of Continuous Compliance with a Remote Workforce
Follow FedInsider on LinkedIn
Compliance is difficult enough in an air-conditioned data center, so for those out on the edge with spotty communication and potential bullets flying around, it could be near impossible. Despite this disruption, newly coined Denied Disconnected Latent, or DDL, when communications are restored, compliance still must be maintained.
This week on Feds At the Edge, we offer some perspectives on how to manage this arduous task. We’ll explore how the developers who deploy the application may not be the ones responsible for endpoint security, and how these two needs to continually be in sync.
Checking compliance during the regular maintenance process & transferring information.
The tools needed to automate this once manual process now in a state of profusion.
Federated vs. centralized compliance.
Defining “end points” in an As-A-Service world.
Tune in on your favorite podcasting platform to hear our experts weigh in.