Ep. 152 How to Fight Threats to the Software Supply Chain
Feds At The Edge by FedInsider
Release Date: 06/03/2024
Feds At The Edge by FedInsider
AI is just another tool in the technology market, only becoming a powerful resource when agencies learn how to best utilize it to reach mission goals. This week on Feds-At-The Edge we explore several insights on deploying AI effectively for the federal government landscape. Caroline Carusone, Deputy CIO for NRC, discusses AI’s potential in identifying security risks and solving complex engineering challenges, like improving atomic reactor designs. Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI's role in handling massive datasets, enhancing...
info_outline Ep. 175 Reprioritizing Mission Delivery and Zero Trust Security in SaaSFeds At The Edge by FedInsider
Software as a Service (SaaS) is incredibly enticing with its ease and affordability, however despite the heavy lifting being done for you, the responsibility of protecting your data and network remains in your hands. This week on Feds-At-The Edge we sit down with Eoghan Casey, VP of Cybersecurity Strategy & Product Development for Own Company, who highlights essential security practices for agencies using Software as a Service (SaaS). >> Understanding data visibility- What's sensitive and what’s not >> The importance of continuous monitoring and backing up...
info_outline Ep. 174 How to Succeed with Zero Trust and AI, Look to Cultural ChangeFeds At The Edge by FedInsider
If you’ve tuned before then you’ve heard the three magic words; People, process, technology. While technology often takes the spotlight, there’s a reason why “people” come first. This week on Feds-At-The Edge we explore the cultural shifts agencies are prioritizing to achieve zero trust. Jothi Dugar, CISO at NIH’s Center for Information Technology emphasizes the age-old advice, communication is key. Federal leaders should speak a language all stakeholders understand, and responsibility should be placed in the hands of the many and not the hands of the select...
info_outline Ep. 173 Using Micro segmentation to ease the Weight of ComplianceFeds At The Edge by FedInsider
In today’s data-driven world, network systems are under immense pressure to handle increasing loads of data while staying compliant in a rapidly evolving landscape. How can agencies effectively secure their systems when every little nook and cranny requires oversight? This week on Feds-At-The Edge we explore how microsegmentation is emerging as a vital strategy for agencies working toward a robust zero-trust architecture. Rob Thorne, CISO of U.S. Immigration and Customs Enforcement, highlights how complex systems often have hidden connections unknown to administrators,...
info_outline Ep. 172 DoD Embracing Continuous MonitoringFeds At The Edge by FedInsider
The concept of "continuous" protection, inspired by continuous software development, is gaining traction among federal tech leaders in response to rising cyber-attacks. This week on Feds At the Edge, we sit down with subject matter experts who provide guidance for transitioning from the basic “Authority to Operate” snapshot in time to a “Continuous Authority to Operate.” Col Bryan A Eovito, Commanding Officer, for the Marine Corps Cyber Operations Group, emphasized the value of establishing a baseline for comparison to detect discrepancies, warning that...
info_outline Ep. 171 Focus on Cyber ResiliencyFeds At The Edge by FedInsider
Your agency will be attacked. Even if we look at the most conservative estimates, a company like shows 32,211 attacks on federal agencies in 2023. The conclusion is obvious: you will be attacked and must have a way to remediate the problem. Today, we sat down with three experienced cyber professionals to hear suggestions on improving federal cyber security resilience. Russel Marsh from the National Nuclear Security Administration observes that federal employees may work 9 am to 5 pm every day, but malicious actors do not. The best practice here is to have a checklist of what to do in an...
info_outline Ep. 170 Election Security: Protecting the Foundation of DemocracyFeds At The Edge by FedInsider
This week on Feds At the Edge, sit down with an industry expert and state election officials from Pennsylvania, Florida, and Georgia to focus on election security challenges and solutions. Challenges: >> Traditional threats like disinformation and denial-of-service (DoS) attacks continue to be significant. There is also a growing concern about the physical threats faced by election officials, leading to high turnover rates. In Pennsylvania, 2/3 of officials have left their positions, resulting in an influx of new, less experienced staff. Solutions: >>...
info_outline Ep. 169 How Digital Playbooks Propel Federal ModernizationFeds At The Edge by FedInsider
In a world of rapid change and threat, organizations need to be ready and waiting with a plan. One good approach some are taking to navigate an ever-evolving landscape is to lean on a “digital playbook.” Customized to each situation and the unique and individual needs agencies big and small have, these playbooks could make the difference between a scramble and a smooth transition. This week on Feds At the Edge, leaders from the Federal and commercial sectors discuss the integration of digital playbooks in federal modernization, emphasizing the blend of people, processes, and...
info_outline Ep. 168 Metrics that Matter for Critical Infrastructure Cyber ResilienceFeds At The Edge by FedInsider
The 2021 Colonial Pipeline incident has stood in history as a prime example of the importance of cyber resilience for critical infrastructure. This week on Feds At the Edge, we delve into the call-to-action events like this have created for agencies everywhere and the resources available for even the smallest entities. Cheri Caddy, Senior Technical Advisor for Cybersecurity at the US Department of Energy, talks about resources like CISA & NIST, but suggests that private companies should also build ties with local FBI offices. Brendan Peter, VP, Global Government...
info_outline Ep. 167 Making Progress in the Incident Response and ReportingFeds At The Edge by FedInsider
When a network is attacked, analysts return to the logs to gain an understanding of where the point of vulnerability was, which makes keeping these records a crucial tool in cyber resilience. However, a lack of staff, poor existing systems, and limitations on information sharing in our increasingly complex and hybrid landscape could prevent agencies from keeping their records reliable and up-to-date. This week on Feds At the Edge, leaders from the Federal and commercial sectors share they ways they’ve been able to overcome the hurdles they face when logging events. Tate...
info_outlineFor the video of this podcast: How to Fight Threats to the Software Supply Chain
Follow Fedinsider on LinkedIn
The federal government is playing a game of cyber-attack-a-mole with bad actors, constantly adapting to their threats but ultimately driving them to other areas, such as targeting endpoints or applications to find a weak point not being monitored.
This week on Feds At the Edge, we are focusing on sophisticated attacks on federal applications and APIs.
Jerry Cochran, Deputy Chief Information Officer and Director of the Cybersecurity & DigitalOps Division from Pacific Northwest National Laboratory, shares how the once popular Software Bill of Materials has weakened over the years thanks to the constant change of code.
AI can help detect vulnerabilities in dynamic code, but attackers also use AI to find weaknesses. Instead of signature-based approaches, Nate Fountain Deputy CISO from ICE, suggests using behavior analytics to prevent compromised code from exfiltrating data.
Tune in on your favorite podcasting platform as our experts discuss the ongoing battle.