loader from loading.io

Ep. 179 How to Defend your Expanding Attack Surface

Feds At The Edge by FedInsider

Release Date: 12/12/2024

Ep. 203 Building Zero Trust on a Sound Foundation show art Ep. 203 Building Zero Trust on a Sound Foundation

Feds At The Edge by FedInsider

The theme of the current administration is to do more with less. Today, we hear from experts on how they have assisted in implementing Zero Trust by leveraging all resources possible.  We know implementing Zero Trust is a continuous process; David Bottom from the SEC provides guidelines on what to review constantly. He suggests focusing on decreasing privileges, patching systems, and learning how to extract meaningful signals from the flood of data entering the federal government. None of this can be done without cooperation across the agency. As an example of working with others,...

info_outline
Ep. 202 Transforming Government Customer Service with New Technology show art Ep. 202 Transforming Government Customer Service with New Technology

Feds At The Edge by FedInsider

One of the greatest promises of modern technology is its ability to streamline complex, paper-based systems - cutting costs, improving access, and eliminating waste, fraud, and abuse.   These complicated systems are often the biproduct of a complicated network, like the ones you find in the Department of Labor which are handling unemployment insurance claims fifty different ways in fifty different states. Or how military members and their families often have to handle an issue when they are thousands of miles from home and might not easily have access.  This week on Feds At The...

info_outline
Ep. 201 Emerging Technology Series – Cybersecurity show art Ep. 201 Emerging Technology Series – Cybersecurity

Feds At The Edge by FedInsider

Automation is everywhere—but is it helping us, or quietly introducing new risks?  This week on Feds At The Edge we share a special three-part series that explores the evolving role of automation in cybersecurity- from its promise to its pitfalls. In session one, we lay the groundwork with a high-level view of automation’s true purpose and challenges. We follow up with session two- digging into application security and the critical role of cloud telemetry. And we wrap up this hour with insights into threat intelligence, risk visability ahd how to stay ahead of evolving...

info_outline
Ep. 200 5G to The Battlefield show art Ep. 200 5G to The Battlefield

Feds At The Edge by FedInsider

In recent years, the Department of Defense has been rethinking how it approaches communications technology—shifting from traditional, insular solutions to embracing innovation from the commercial sector. While off-the-shelf cellular devices aren’t suitable for the battlefield, the underlying technologies powering 5G and emerging 6G networks are becoming too valuable to ignore.   This week on Feds At The Edge, we explore how the military can harness advanced commercial technologies like 5G, 6G, and AI to enhance battlefield operations. The discussion centers on three critical...

info_outline
Ep. 199 Protecting Healthcare Identity from Modern Cyber Attack show art Ep. 199 Protecting Healthcare Identity from Modern Cyber Attack

Feds At The Edge by FedInsider

The 2023 FBI Internet Crime Report reveals that nearly 21% of ransomware attacks targeted the healthcare and public health sectors—making them the top victims.   This week on Feds At The Edge, we explore how agencies can defend against these growing threats.   Benjamin Koshy, Chief Information Security Officer and Director, Division of Information Security of Indian Health Service, explains the unique identity management challenge in healthcare: balancing open patient access with strict data protection.  Keith Busby, Acting CISO at CMS, outlines how to go beyond Zero...

info_outline
Ep. 198 Identity Governance and Zero Trust - Best Practices for a Multi-Cloud Environment show art Ep. 198 Identity Governance and Zero Trust - Best Practices for a Multi-Cloud Environment

Feds At The Edge by FedInsider

Today’s modern network has placed identity management in the forefront to manage a plethora of landscapes – on and off prem, public and private, hybrid, and the new kid on the block, alt-clouds.  This week on Feds At The Edge, we explore how the Defense Information Systems Agency (DISA) is leading the charge in modern identity management, once a backwater concept, to center stage, with its ambitious program, Thunderdome.   Chris Pymm, Portfolio Manager, Zero Trust & Division Chief for ID7 at DISA, shares how Thunderdome spans 50 sites and 12,000 users,...

info_outline
Ep. 197  Secure By Design: Driving Government Modernization Through Secure Development Practices show art Ep. 197 Secure By Design: Driving Government Modernization Through Secure Development Practices

Feds At The Edge by FedInsider

“Shift Left” is a popular phrase in software development used to represent the idea of prioritizing certain tasks earlier in the life cycle process to avoid or easily identify potential problems before it moves on.   This week on Feds At The Edge, we ask the question – What does it take and what does it really mean to “shift left.” Our expert guests share practical insights on tackling the complex realities of modern software design and deployment.   Amit Madan, Chief Architect, Center for Enterprise Modernization at Mitre, recommends preparing for...

info_outline
Ep. 196 Accelerating Cloud Migration for Agencies show art Ep. 196 Accelerating Cloud Migration for Agencies

Feds At The Edge by FedInsider

As federal agencies move toward greater efficiency, cloud adoption is making the transition from optional to essential. But Federal leaders know not every system is a good candidate.   This week on Feds At The Edge, our expert guests share what agencies will need to know in order to identify which of their systems can move to the cloud and which systems are best suited to remain on-prem.   David Updike, CTO and Director for the Office of Digital Services & Technology Architecture at EPA, explains how cost frameworks reveal trade-offs between flexibility and savings, and...

info_outline
Ep. 195 Creating a Zero Trust Ecosystem show art Ep. 195 Creating a Zero Trust Ecosystem

Feds At The Edge by FedInsider

Zero Trust is more than a technology shift, it’s a cultural one.  This week on Feds At The Edge, our expert guests explore how agencies can successfully implement Zero Trust by focusing on people, leveraging AI, and understanding risk at every level.   With over 600,000 employees and 1,000 applications, the USPS faced a massive challenge. Heather Dyer, VP & Chief Information Security Officer for the USPS, shares how clear communication, continuous monitoring, and behavioral insights were key to driving adoption. Joined by Prem Jadhwani, CTO at Government...

info_outline
Ep. 194 Bringing Together Cloud Flexibility & AI Power show art Ep. 194 Bringing Together Cloud Flexibility & AI Power

Feds At The Edge by FedInsider

  The cloud offers incredible potential, are you making the most of it?     This week on Feds At The Edge, our expert guests explore three key strategies for utilizing AI to optimize potential, lighten workloads and ensure security in the hybrid and cloud work landscape.    >> AI for Smarter Cloud Management: Kevin Walsh, Director, Information Technology and Cybersecurity Team at GAO, suggests turning your focus on what we’ve learned from past use cases, especially for those who are overwhelmed with the idea of where to even begin their...

info_outline
 
More Episodes

SaaS (Software as a Service) applications, due to their ease of launch and proliferation, have created a “perfect storm” for attackers, and a significant challenge for cybersecurity professionals. Organizations with over 1,000 employees typically use 150+ SaaS applications, often unmanaged, which expands the attack surface and poses a unique threat to entities like the federal government.  

 This week on Feds At the Edge, we discuss where the threats may lie and give practical information on attempting to control this new threat vector.    

 Mark Canter, CISO at US GAO, highlights the widespread lack of understanding about where data is used, emphasizing the importance of good data management practices. AI can play a pivotal role in systematically addressing this issue.  

 Tune in on your favorite podcasting platform as we explore why organizations should maintain accurate inventories of SaaS applications, identifying and managing shadow SaaS apps, and implementing robust governance practices to secure and optimize their SaaS ecosystems.