loader from loading.io

Ep. 166 Mobile Security - a Requirement for National Security

Feds At The Edge by FedInsider

Release Date: 09/11/2024

Ep. 182 CDM Success Stories in an Age of Cyber-attack Surface Expansion show art Ep. 182 CDM Success Stories in an Age of Cyber-attack Surface Expansion

Feds At The Edge by FedInsider

This week on Feds At the Edge, we dive into the evolution of the Cybersecurity and Infrastructure Agency's Continuous Diagnostics and Mitigation (CDM) program in addressing the growing cyber-attack surface.   Hemant Baidwan, CISO for DHS, OCIO, noted that Continuous Diagnostics and Mitigation is a comprehensive suite of tools and policies, with a key focus on understanding the attack surface and ensuring high data quality during deployment.  John Schneider, Senior Systems Engineer, Axonius Federal, discussed the challenges inherent in managing IoT and OT devices...

info_outline
Ep. 181 Boosting Data Security and Cyber Resilience in Federal Health IT show art Ep. 181 Boosting Data Security and Cyber Resilience in Federal Health IT

Feds At The Edge by FedInsider

  The U.S. healthcare system, which includes roughly 200 federal hospitals, are constantly at risk for or under cyber-attack.   This week on Feds-At-The Edge we explore ways to improve security through basic controls like software updates and patching, with the conversation quickly turning to the importance of practical strategy.   >> Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface   >> Human Interaction: Learn the critical role humans play amid the new promises of AI   >> Contingency...

info_outline
Ep. 180 Automation as a Cybersecurity Resource show art Ep. 180 Automation as a Cybersecurity Resource

Feds At The Edge by FedInsider

  Managing vast amounts of data, reducing alert fatigue, and improving threat detection can all be accomplished with automation.  This week on Feds At the Edge, we have three experts in automating cybersecurity response to provide guidance on best practices to deploy automation. They highlighted the need to establish a valid baseline for expected network behavior to identify deviations effectively, reducing false positives.   Bob Costello, CIO at CISA, stressed keeping humans involved in the process, citing a recent incident where AI breached an...

info_outline
Ep. 179 How to Defend your Expanding Attack Surface show art Ep. 179 How to Defend your Expanding Attack Surface

Feds At The Edge by FedInsider

SaaS (Software as a Service) applications, due to their ease of launch and proliferation, have created a “perfect storm” for attackers, and a significant challenge for cybersecurity professionals. Organizations with over 1,000 employees typically use 150+ SaaS applications, often unmanaged, which expands the attack surface and poses a unique threat to entities like the federal government.    This week on Feds At the Edge, we discuss where the threats may lie and give practical information on attempting to control this new threat vector.    ...

info_outline
Ep. 178 Protecting Critical Infrastructure show art Ep. 178 Protecting Critical Infrastructure

Feds At The Edge by FedInsider

Malicious actors are always looking for the “Easy Button” when it comes to breaching your system.  This week on Feds At the Edge, we are revisiting our conversation on looking at the protection of Operational Technology (OT), critical hardware on premises. Traditionally separated from IT systems by air gaps, OT is now increasingly managed by IT departments due to the convergence of IT and OT.   Few realize that OT has federal compliance regulations, just like IT. The real issue, should an OT systems administrator have to do repetitive work to comply with IT mandates? Marty...

info_outline
Ep. 177 Part Two: Considering AI as a Strategic Tool show art Ep. 177 Part Two: Considering AI as a Strategic Tool

Feds At The Edge by FedInsider

This week on Feds-At-The Edge we explore AI used as a strategic tool, focused on risk mitigation, applications, and continuous user feedback.  >> Risk Mitigation: Risks vary by application. Luke Keller, Chief Innovation Officer at US Census bureau, highlighted using NIST guidelines, including bias reduction frameworks, to ensure ethical and accurate AI deployment. High-quality, diverse datasets are essential.   >> Use Cases: Start small with proofs of concept to test limitations and risks. Ryan Simpson, Engineering Chief Technologist for the Public Sector for...

info_outline
Ep. 176 Part One:  Considering AI as a Strategic Tool show art Ep. 176 Part One: Considering AI as a Strategic Tool

Feds At The Edge by FedInsider

AI is just another tool in the technology market, only becoming a powerful resource when agencies learn how to best utilize it to reach mission goals.   This week on Feds-At-The Edge we explore several insights on deploying AI effectively for the federal government landscape.   Caroline Carusone, Deputy CIO for NRC, discusses AI’s potential in identifying security risks and solving complex engineering challenges, like improving atomic reactor designs.   Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI's role in handling massive datasets, enhancing...

info_outline
Ep. 175 Reprioritizing Mission Delivery and Zero Trust Security in SaaS show art Ep. 175 Reprioritizing Mission Delivery and Zero Trust Security in SaaS

Feds At The Edge by FedInsider

Software as a Service (SaaS) is incredibly enticing with its ease and affordability, however despite the heavy lifting being done for you, the responsibility of protecting your data and network remains in your hands.   This week on Feds-At-The Edge we sit down with Eoghan Casey, VP of Cybersecurity Strategy & Product Development for Own Company, who highlights essential security practices for agencies using Software as a Service (SaaS).   >> Understanding data visibility- What's sensitive and what’s not  >> The importance of continuous monitoring and backing up...

info_outline
Ep. 174 How to Succeed with Zero Trust and AI, Look to Cultural Change show art Ep. 174 How to Succeed with Zero Trust and AI, Look to Cultural Change

Feds At The Edge by FedInsider

If you’ve tuned before then you’ve heard the three magic words; People, process, technology. While technology often takes the spotlight, there’s a reason why “people” come first.   This week on Feds-At-The Edge we explore the cultural shifts agencies are prioritizing to achieve zero trust.   Jothi Dugar, CISO at NIH’s Center for Information Technology emphasizes the age-old advice, communication is key. Federal leaders should speak a language all stakeholders understand, and responsibility should be placed in the hands of the many and not the hands of the select...

info_outline
Ep. 173 Using Micro segmentation to ease the Weight of Compliance show art Ep. 173 Using Micro segmentation to ease the Weight of Compliance

Feds At The Edge by FedInsider

In today’s data-driven world, network systems are under immense pressure to handle increasing loads of data while staying compliant in a rapidly evolving landscape. How can agencies effectively secure their systems when every little nook and cranny requires oversight?   This week on Feds-At-The Edge we explore how microsegmentation is emerging as a vital strategy for agencies working toward a robust zero-trust architecture.    Rob Thorne, CISO of U.S. Immigration and Customs Enforcement, highlights how complex systems often have hidden connections unknown to administrators,...

info_outline
 
More Episodes

With an accelerated leap in our post-COVID world, mobile devices such as cell phones have become a crucial part of the landscape for remote workers and in turn have also become a key component of today’s attack surface. 

This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.  

Tune in on your favorite podcasting platform as agency and industry experts share methods to protect mobile devices, secure applications, keep operating systems updated and train users not to fall prey to web-based attacks.