loader from loading.io

Ep. 152 How to Fight Threats to the Software Supply Chain

Feds At The Edge by FedInsider

Release Date: 06/03/2024

Ep. 176 Part One:  Considering AI as a Strategic Tool show art Ep. 176 Part One: Considering AI as a Strategic Tool

Feds At The Edge by FedInsider

AI is just another tool in the technology market, only becoming a powerful resource when agencies learn how to best utilize it to reach mission goals.   This week on Feds-At-The Edge we explore several insights on deploying AI effectively for the federal government landscape.   Caroline Carusone, Deputy CIO for NRC, discusses AI’s potential in identifying security risks and solving complex engineering challenges, like improving atomic reactor designs.   Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI's role in handling massive datasets, enhancing...

info_outline
Ep. 175 Reprioritizing Mission Delivery and Zero Trust Security in SaaS show art Ep. 175 Reprioritizing Mission Delivery and Zero Trust Security in SaaS

Feds At The Edge by FedInsider

Software as a Service (SaaS) is incredibly enticing with its ease and affordability, however despite the heavy lifting being done for you, the responsibility of protecting your data and network remains in your hands.   This week on Feds-At-The Edge we sit down with Eoghan Casey, VP of Cybersecurity Strategy & Product Development for Own Company, who highlights essential security practices for agencies using Software as a Service (SaaS).   >> Understanding data visibility- What's sensitive and what’s not  >> The importance of continuous monitoring and backing up...

info_outline
Ep. 174 How to Succeed with Zero Trust and AI, Look to Cultural Change show art Ep. 174 How to Succeed with Zero Trust and AI, Look to Cultural Change

Feds At The Edge by FedInsider

If you’ve tuned before then you’ve heard the three magic words; People, process, technology. While technology often takes the spotlight, there’s a reason why “people” come first.   This week on Feds-At-The Edge we explore the cultural shifts agencies are prioritizing to achieve zero trust.   Jothi Dugar, CISO at NIH’s Center for Information Technology emphasizes the age-old advice, communication is key. Federal leaders should speak a language all stakeholders understand, and responsibility should be placed in the hands of the many and not the hands of the select...

info_outline
Ep. 173 Using Micro segmentation to ease the Weight of Compliance show art Ep. 173 Using Micro segmentation to ease the Weight of Compliance

Feds At The Edge by FedInsider

In today’s data-driven world, network systems are under immense pressure to handle increasing loads of data while staying compliant in a rapidly evolving landscape. How can agencies effectively secure their systems when every little nook and cranny requires oversight?   This week on Feds-At-The Edge we explore how microsegmentation is emerging as a vital strategy for agencies working toward a robust zero-trust architecture.    Rob Thorne, CISO of U.S. Immigration and Customs Enforcement, highlights how complex systems often have hidden connections unknown to administrators,...

info_outline
Ep. 172 DoD Embracing Continuous Monitoring show art Ep. 172 DoD Embracing Continuous Monitoring

Feds At The Edge by FedInsider

The concept of "continuous" protection, inspired by continuous software development, is gaining traction among federal tech leaders in response to rising cyber-attacks.   This week on Feds At the Edge, we sit down with subject matter experts who provide guidance for transitioning from the basic “Authority to Operate” snapshot in time to a “Continuous Authority to Operate.”   Col Bryan A Eovito, Commanding Officer, for the Marine Corps Cyber Operations Group, emphasized the value of establishing a baseline for comparison to detect discrepancies, warning that...

info_outline
Ep. 171 Focus on Cyber Resiliency show art Ep. 171 Focus on Cyber Resiliency

Feds At The Edge by FedInsider

Your agency will be attacked. Even if we look at the most conservative estimates, a company like shows 32,211 attacks on federal agencies in 2023. The conclusion is obvious: you will be attacked and must have a way to remediate the problem. Today, we sat down with three experienced cyber professionals to hear suggestions on improving federal cyber security resilience. Russel Marsh from the National Nuclear Security Administration observes that federal employees may work 9 am to 5 pm every day, but malicious actors do not. The best practice here is to have a checklist of what to do in an...

info_outline
Ep. 170 Election Security: Protecting the Foundation of Democracy show art Ep. 170 Election Security: Protecting the Foundation of Democracy

Feds At The Edge by FedInsider

This week on Feds At the Edge, sit down with an industry expert and state election officials from Pennsylvania, Florida, and Georgia to focus on election security challenges and solutions.    Challenges:  >> Traditional threats like disinformation and denial-of-service (DoS) attacks continue to be significant. There is also a growing concern about the physical threats faced by election officials, leading to high turnover rates. In Pennsylvania, 2/3 of officials have left their positions, resulting in an influx of new, less experienced staff.  Solutions:  >>...

info_outline
Ep. 169 How Digital Playbooks Propel Federal Modernization show art Ep. 169 How Digital Playbooks Propel Federal Modernization

Feds At The Edge by FedInsider

In a world of rapid change and threat, organizations need to be ready and waiting with a plan. One good approach some are taking to navigate an ever-evolving landscape is to lean on a “digital playbook.” Customized to each situation and the unique and individual needs agencies big and small have, these playbooks could make the difference between a scramble and a smooth transition.   This week on Feds At the Edge, leaders from the Federal and commercial sectors discuss the integration of digital playbooks in federal modernization, emphasizing the blend of people, processes, and...

info_outline
Ep. 168 Metrics that Matter for Critical Infrastructure Cyber Resilience show art Ep. 168 Metrics that Matter for Critical Infrastructure Cyber Resilience

Feds At The Edge by FedInsider

The 2021 Colonial Pipeline incident has stood in history as a prime example of the importance of cyber resilience for critical infrastructure. This week on Feds At the Edge, we delve into the call-to-action events like this have created for agencies everywhere and the resources available for even the smallest entities.    Cheri Caddy, Senior Technical Advisor for Cybersecurity at the US Department of Energy, talks about resources like CISA & NIST, but suggests that private companies should also build ties with local FBI offices.    Brendan Peter, VP, Global Government...

info_outline
Ep. 167 Making Progress in the Incident Response and Reporting show art Ep. 167 Making Progress in the Incident Response and Reporting

Feds At The Edge by FedInsider

When a network is attacked, analysts return to the logs to gain an understanding of where the point of vulnerability was, which makes keeping these records a crucial tool in cyber resilience.   However, a lack of staff, poor existing systems, and limitations on information sharing in our increasingly complex and hybrid landscape could prevent agencies from keeping their records reliable and up-to-date.   This week on Feds At the Edge, leaders from the Federal and commercial sectors share they ways they’ve been able to overcome the hurdles they face when logging events. Tate...

info_outline
 
More Episodes

For the video of this podcast: How to Fight Threats to the Software Supply Chain  

Follow Fedinsider on LinkedIn 

The federal government is playing a game of cyber-attack-a-mole with bad actors, constantly adapting to their threats but ultimately driving them to other areas, such as targeting endpoints or applications to find a weak point not being monitored.

This week on Feds At the Edge, we are focusing on sophisticated attacks on federal applications and APIs.

Jerry Cochran, Deputy Chief Information Officer and Director of the Cybersecurity & DigitalOps Division from Pacific Northwest National Laboratory, shares how the once popular Software Bill of Materials has weakened over the years thanks to the constant change of code.

AI can help detect vulnerabilities in dynamic code, but attackers also use AI to find weaknesses. Instead of signature-based approaches, Nate Fountain Deputy CISO from ICE, suggests using behavior analytics to prevent compromised code from exfiltrating data.

Tune in on your favorite podcasting platform as our experts discuss the ongoing battle.