Ep. 185 Dedicating Cybersecurity Resources to Critical Infrastructure
Feds At The Edge by FedInsider
Release Date: 01/30/2025
Feds At The Edge by FedInsider
The theme of the current administration is to do more with less. Today, we hear from experts on how they have assisted in implementing Zero Trust by leveraging all resources possible. We know implementing Zero Trust is a continuous process; David Bottom from the SEC provides guidelines on what to review constantly. He suggests focusing on decreasing privileges, patching systems, and learning how to extract meaningful signals from the flood of data entering the federal government. None of this can be done without cooperation across the agency. As an example of working with others,...
info_outlineFeds At The Edge by FedInsider
One of the greatest promises of modern technology is its ability to streamline complex, paper-based systems - cutting costs, improving access, and eliminating waste, fraud, and abuse. These complicated systems are often the biproduct of a complicated network, like the ones you find in the Department of Labor which are handling unemployment insurance claims fifty different ways in fifty different states. Or how military members and their families often have to handle an issue when they are thousands of miles from home and might not easily have access. This week on Feds At The...
info_outlineFeds At The Edge by FedInsider
Automation is everywhere—but is it helping us, or quietly introducing new risks? This week on Feds At The Edge we share a special three-part series that explores the evolving role of automation in cybersecurity- from its promise to its pitfalls. In session one, we lay the groundwork with a high-level view of automation’s true purpose and challenges. We follow up with session two- digging into application security and the critical role of cloud telemetry. And we wrap up this hour with insights into threat intelligence, risk visability ahd how to stay ahead of evolving...
info_outlineFeds At The Edge by FedInsider
In recent years, the Department of Defense has been rethinking how it approaches communications technology—shifting from traditional, insular solutions to embracing innovation from the commercial sector. While off-the-shelf cellular devices aren’t suitable for the battlefield, the underlying technologies powering 5G and emerging 6G networks are becoming too valuable to ignore. This week on Feds At The Edge, we explore how the military can harness advanced commercial technologies like 5G, 6G, and AI to enhance battlefield operations. The discussion centers on three critical...
info_outlineFeds At The Edge by FedInsider
The 2023 FBI Internet Crime Report reveals that nearly 21% of ransomware attacks targeted the healthcare and public health sectors—making them the top victims. This week on Feds At The Edge, we explore how agencies can defend against these growing threats. Benjamin Koshy, Chief Information Security Officer and Director, Division of Information Security of Indian Health Service, explains the unique identity management challenge in healthcare: balancing open patient access with strict data protection. Keith Busby, Acting CISO at CMS, outlines how to go beyond Zero...
info_outlineFeds At The Edge by FedInsider
Today’s modern network has placed identity management in the forefront to manage a plethora of landscapes – on and off prem, public and private, hybrid, and the new kid on the block, alt-clouds. This week on Feds At The Edge, we explore how the Defense Information Systems Agency (DISA) is leading the charge in modern identity management, once a backwater concept, to center stage, with its ambitious program, Thunderdome. Chris Pymm, Portfolio Manager, Zero Trust & Division Chief for ID7 at DISA, shares how Thunderdome spans 50 sites and 12,000 users,...
info_outlineFeds At The Edge by FedInsider
“Shift Left” is a popular phrase in software development used to represent the idea of prioritizing certain tasks earlier in the life cycle process to avoid or easily identify potential problems before it moves on. This week on Feds At The Edge, we ask the question – What does it take and what does it really mean to “shift left.” Our expert guests share practical insights on tackling the complex realities of modern software design and deployment. Amit Madan, Chief Architect, Center for Enterprise Modernization at Mitre, recommends preparing for...
info_outlineFeds At The Edge by FedInsider
As federal agencies move toward greater efficiency, cloud adoption is making the transition from optional to essential. But Federal leaders know not every system is a good candidate. This week on Feds At The Edge, our expert guests share what agencies will need to know in order to identify which of their systems can move to the cloud and which systems are best suited to remain on-prem. David Updike, CTO and Director for the Office of Digital Services & Technology Architecture at EPA, explains how cost frameworks reveal trade-offs between flexibility and savings, and...
info_outlineFeds At The Edge by FedInsider
Zero Trust is more than a technology shift, it’s a cultural one. This week on Feds At The Edge, our expert guests explore how agencies can successfully implement Zero Trust by focusing on people, leveraging AI, and understanding risk at every level. With over 600,000 employees and 1,000 applications, the USPS faced a massive challenge. Heather Dyer, VP & Chief Information Security Officer for the USPS, shares how clear communication, continuous monitoring, and behavioral insights were key to driving adoption. Joined by Prem Jadhwani, CTO at Government...
info_outlineFeds At The Edge by FedInsider
The cloud offers incredible potential, are you making the most of it? This week on Feds At The Edge, our expert guests explore three key strategies for utilizing AI to optimize potential, lighten workloads and ensure security in the hybrid and cloud work landscape. >> AI for Smarter Cloud Management: Kevin Walsh, Director, Information Technology and Cybersecurity Team at GAO, suggests turning your focus on what we’ve learned from past use cases, especially for those who are overwhelmed with the idea of where to even begin their...
info_outlineProtecting operational technology (OT) environments is more complex than ever, requiring precise inventory, continuous monitoring, and strong IT-OT collaboration.
This week on Feds At the Edge, our expert panel unpacks the key cybersecurity challenges operators face in securing their OT systems.
Anthony J. DiPietro, Technical Director, Defense Critical Infrastructure Division for NSA, underscores the importance of maintaining an accurate inventory, especially in remote environments where “ghost” assets can appear unnoticed.
We’ll discuss how continuous monitoring helps mitigate these risks and why traditional IT security methods, like sandboxes and automatic updates, don’t always work for OT systems.
We also explore the evolving role of AI and Machine learning in OT security, workforce development, and the ever-growing threats posed by interconnected IoT and OT networks.
Tune in on your favorite podcast platform for expert insights on fortifying OT environments against emerging cyber threats.