loader from loading.io

Ep. 163 Zero-Day Chronicles: Lessons from the Front Line

Feds At The Edge by FedInsider

Release Date: 08/19/2024

Ep. 176 Part One:  Considering AI as a Strategic Tool show art Ep. 176 Part One: Considering AI as a Strategic Tool

Feds At The Edge by FedInsider

AI is just another tool in the technology market, only becoming a powerful resource when agencies learn how to best utilize it to reach mission goals.   This week on Feds-At-The Edge we explore several insights on deploying AI effectively for the federal government landscape.   Caroline Carusone, Deputy CIO for NRC, discusses AI’s potential in identifying security risks and solving complex engineering challenges, like improving atomic reactor designs.   Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI's role in handling massive datasets, enhancing...

info_outline
Ep. 175 Reprioritizing Mission Delivery and Zero Trust Security in SaaS show art Ep. 175 Reprioritizing Mission Delivery and Zero Trust Security in SaaS

Feds At The Edge by FedInsider

Software as a Service (SaaS) is incredibly enticing with its ease and affordability, however despite the heavy lifting being done for you, the responsibility of protecting your data and network remains in your hands.   This week on Feds-At-The Edge we sit down with Eoghan Casey, VP of Cybersecurity Strategy & Product Development for Own Company, who highlights essential security practices for agencies using Software as a Service (SaaS).   >> Understanding data visibility- What's sensitive and what’s not  >> The importance of continuous monitoring and backing up...

info_outline
Ep. 174 How to Succeed with Zero Trust and AI, Look to Cultural Change show art Ep. 174 How to Succeed with Zero Trust and AI, Look to Cultural Change

Feds At The Edge by FedInsider

If you’ve tuned before then you’ve heard the three magic words; People, process, technology. While technology often takes the spotlight, there’s a reason why “people” come first.   This week on Feds-At-The Edge we explore the cultural shifts agencies are prioritizing to achieve zero trust.   Jothi Dugar, CISO at NIH’s Center for Information Technology emphasizes the age-old advice, communication is key. Federal leaders should speak a language all stakeholders understand, and responsibility should be placed in the hands of the many and not the hands of the select...

info_outline
Ep. 173 Using Micro segmentation to ease the Weight of Compliance show art Ep. 173 Using Micro segmentation to ease the Weight of Compliance

Feds At The Edge by FedInsider

In today’s data-driven world, network systems are under immense pressure to handle increasing loads of data while staying compliant in a rapidly evolving landscape. How can agencies effectively secure their systems when every little nook and cranny requires oversight?   This week on Feds-At-The Edge we explore how microsegmentation is emerging as a vital strategy for agencies working toward a robust zero-trust architecture.    Rob Thorne, CISO of U.S. Immigration and Customs Enforcement, highlights how complex systems often have hidden connections unknown to administrators,...

info_outline
Ep. 172 DoD Embracing Continuous Monitoring show art Ep. 172 DoD Embracing Continuous Monitoring

Feds At The Edge by FedInsider

The concept of "continuous" protection, inspired by continuous software development, is gaining traction among federal tech leaders in response to rising cyber-attacks.   This week on Feds At the Edge, we sit down with subject matter experts who provide guidance for transitioning from the basic “Authority to Operate” snapshot in time to a “Continuous Authority to Operate.”   Col Bryan A Eovito, Commanding Officer, for the Marine Corps Cyber Operations Group, emphasized the value of establishing a baseline for comparison to detect discrepancies, warning that...

info_outline
Ep. 171 Focus on Cyber Resiliency show art Ep. 171 Focus on Cyber Resiliency

Feds At The Edge by FedInsider

Your agency will be attacked. Even if we look at the most conservative estimates, a company like shows 32,211 attacks on federal agencies in 2023. The conclusion is obvious: you will be attacked and must have a way to remediate the problem. Today, we sat down with three experienced cyber professionals to hear suggestions on improving federal cyber security resilience. Russel Marsh from the National Nuclear Security Administration observes that federal employees may work 9 am to 5 pm every day, but malicious actors do not. The best practice here is to have a checklist of what to do in an...

info_outline
Ep. 170 Election Security: Protecting the Foundation of Democracy show art Ep. 170 Election Security: Protecting the Foundation of Democracy

Feds At The Edge by FedInsider

This week on Feds At the Edge, sit down with an industry expert and state election officials from Pennsylvania, Florida, and Georgia to focus on election security challenges and solutions.    Challenges:  >> Traditional threats like disinformation and denial-of-service (DoS) attacks continue to be significant. There is also a growing concern about the physical threats faced by election officials, leading to high turnover rates. In Pennsylvania, 2/3 of officials have left their positions, resulting in an influx of new, less experienced staff.  Solutions:  >>...

info_outline
Ep. 169 How Digital Playbooks Propel Federal Modernization show art Ep. 169 How Digital Playbooks Propel Federal Modernization

Feds At The Edge by FedInsider

In a world of rapid change and threat, organizations need to be ready and waiting with a plan. One good approach some are taking to navigate an ever-evolving landscape is to lean on a “digital playbook.” Customized to each situation and the unique and individual needs agencies big and small have, these playbooks could make the difference between a scramble and a smooth transition.   This week on Feds At the Edge, leaders from the Federal and commercial sectors discuss the integration of digital playbooks in federal modernization, emphasizing the blend of people, processes, and...

info_outline
Ep. 168 Metrics that Matter for Critical Infrastructure Cyber Resilience show art Ep. 168 Metrics that Matter for Critical Infrastructure Cyber Resilience

Feds At The Edge by FedInsider

The 2021 Colonial Pipeline incident has stood in history as a prime example of the importance of cyber resilience for critical infrastructure. This week on Feds At the Edge, we delve into the call-to-action events like this have created for agencies everywhere and the resources available for even the smallest entities.    Cheri Caddy, Senior Technical Advisor for Cybersecurity at the US Department of Energy, talks about resources like CISA & NIST, but suggests that private companies should also build ties with local FBI offices.    Brendan Peter, VP, Global Government...

info_outline
Ep. 167 Making Progress in the Incident Response and Reporting show art Ep. 167 Making Progress in the Incident Response and Reporting

Feds At The Edge by FedInsider

When a network is attacked, analysts return to the logs to gain an understanding of where the point of vulnerability was, which makes keeping these records a crucial tool in cyber resilience.   However, a lack of staff, poor existing systems, and limitations on information sharing in our increasingly complex and hybrid landscape could prevent agencies from keeping their records reliable and up-to-date.   This week on Feds At the Edge, leaders from the Federal and commercial sectors share they ways they’ve been able to overcome the hurdles they face when logging events. Tate...

info_outline
 
More Episodes

People imagine large organizations such as the Department of Transportation when they think about who needs to utilize Zero Trust. What they don’t realize is that a smaller entity can make for a profitable attack, even a gateway to those larger targets.  

In this week's Feds At The Edge podcast, Nick Graham, Senior Technical Sales Engineer of Civilian Sales from Raven Tek offers some solutions that smaller institutions should prioritize in their transition to a safer cybersecurity posture. 

>> Multifactor Authentication – How this framework for larger organizations can move to eliminate many security problems 

>> Staffing limitations – A look at those challenges of limited budgets and cost-effective ways to manage services.  

>> Training, training, and training- Recognizing potential attacks in your company inbox. Tune in on your favorite podcasting platform to hear Nick’s practical solutions for smaller organizations to

enhance their security posture.