Ep. 187 Using Security Intelligence to Protect Healthcare IT
Feds At The Edge by FedInsider
Release Date: 02/12/2025
Feds At The Edge by FedInsider
In today’s episode, we get the unvarnished truth about making the difficult transition from federal on-prem networks to the cloud. Michael Howard, US Transportation Command, gives a thorough analysis of topics like containers, cloud service providers, and specific benefits of cloud native applications. He has experience in enterprise-level commercial organizations, enabling him to compare available tools with those approved for a secure environment like the DoD. He begins by stating that his area of responsibility is making a transition away from the traditional...
info_outlineFeds At The Edge by FedInsider
Here is the link to the free webinar on August 27, 2025 2pm EDT Cybersecurity teams are facing a “perfect storm” - more attacks, fewer defenders, and outdated infrastructure. This week on Feds At The Edge, we offer a sneak peek into an upcoming webinar that will teach you how to truly see what’s happening on your network- moving beyond basic monitoring to actionable observation. Brian Chamberlain, Account Executive, USMC/USN, SolarWinds, Chamberlain breaks down why simple monitoring isn’t enough. Without pinpointing blind spots or knowing where to start, agencies waste...
info_outlineFeds At The Edge by FedInsider
Everyone knows it’s not just about having data, it’s about having the right data. This week on Feds At The Edge, we’re diving into how federal and state agencies are transforming raw data into trusted, actionable insights that drive better outcomes. Our expert panel breaks down how data modeling is bridging the gap between collection and impact: Natalie Evans Harris, CDO for the State of Maryland, reveals how trust begins with engaging staff, educating users, and gathering feedback. Marcus Thornton, Deputy CDO for the Commonwealth of Virginia,...
info_outlineFeds At The Edge by FedInsider
When new technology is introduced, people may not take advantage of the advanced capabilities. The transition to a Zero Trust methodology is causing federal leaders to abandon traditional methods of compliance. Keith Busby from CMS sums up the problem nicely. Some of the systems he supports serves the needs of 150 million Americans. If they don’t leverage the capabilities of the cloud, then they will never be able to move to a much more secure Zero Trust Architecture. Shane Barney from USCIS provides even more shocking numbers. He casually mentions on his log...
info_outlineFeds At The Edge by FedInsider
Any individual would know keeping operating systems up to date is a no-brainer when it comes to cybersecurity. But what happens when you’re managing an estimated seven million devices? This is the challenge for the Department of Defense. This week on Feds At The Edge, we unpack the concept of applying Security Technical Implementation Guides, otherwise known as STIG, crucial tools for configuration management. Dr. Kurt Jarvis, Technical Director for Cyber for the Air Force Sustainment Center, explains why each environment's unique risk profile makes STIG essential...
info_outlineFeds At The Edge by FedInsider
Fifteen years ago, “continuous monitoring” was as simple as watching a single server down the hall. Today, it’s a high-stakes mission across sprawling hybrid networks being bombarded with data and under constant security threats. This week on Feds At The Edge, we explore how federal agencies are modernizing the once-simple concept of Continuous Diagnostics and Mitigation (CDM) to protect complex, data-heavy systems. Jason Ralph, Director of Security Operations for the Department of Labor, shares candid insights on deploying new CDM...
info_outlineFeds At The Edge by FedInsider
As cyber threats grow more sophisticated, federal agencies need security that can think on its feet. This week on Feds At The Edge, we explore how agencies are evolving toward Zero Trust by implementing dynamic security—a flexible approach that adjusts access and authentication in real time based on context and behavior. Justin Chin, Director of the Government Solutions Segment at Ping Identity, opens with a relatable example: when your bank flags suspicious login activity and adds a second layer of authentication. That adaptive friction...
info_outlineFeds At The Edge by FedInsider
Everyone wants a secure network, but how do you prove it? This week on Feds At The Edge, we speak with cybersecurity experts to discuss how to establish meaningful cybersecurity metrics to document that security. LtCol Natalie Lamb, Cybersecurity Division OIC, Cyberspace Operations Group in the USMC, and Brian "Stretch" Meyer, Sr. Director of Engineering at Axonius Federal, breaks down three essential areas for leaders to focus on: 1. Aligning Investments - With limited time and funding, agencies must prioritize cybersecurity efforts that support...
info_outlineFeds At The Edge by FedInsider
Everyone knows automation is powerful, but it’s also a double-edged sword. This week on Feds At The Edge, we speak with cybersecurity experts who share how to securely align automation with Zero Trust principles. We spend the hour diving to importance of shared responsibility models, protecting critical surfaces, and using automation to enhance observability and control, especially in cloud environments. Michael Hardee, Chief Architect for Red Hat, shares insights on how automation can reduce social engineering risks by eliminating human override. While Don...
info_outlineFeds At The Edge by FedInsider
The theme of the current administration is to do more with less. Today, we hear from experts on how they have assisted in implementing Zero Trust by leveraging all resources possible. We know implementing Zero Trust is a continuous process; David Bottom from the SEC provides guidelines on what to review constantly. He suggests focusing on decreasing privileges, patching systems, and learning how to extract meaningful signals from the flood of data entering the federal government. None of this can be done without cooperation across the agency. As an example of working with others,...
info_outlineWhile the ability to transfer records between hospitals and other medical systems offers significant benefits, it also introduces unique challenges and risk for safeguarding Healthcare IT.
This week on Feds At the Edge, federal leaders examine three areas of concern:
>>interoperability
>>unique aspects of the attack surface
>>the impact of IoT devices.
Jennifer Franks, Director, Center for Enhanced Cybersecurity for GAO, highlights reports of rising cyber threats due to medical data interconnectivity and the need to secure legacy systems, especially since medical data remains unchanged over time.
Joe Ronzio, Deputy Chief Health Technology Officer, Veterans Health Administration, shares the difficulties of managing medical device inventories across 170+ hospitals and highlights how upgrading encryption systems, like FIPS 140, can introduce vulnerabilities.
Tune in on your favorite podcasting platform now to learn about how healthcare organizations can navigate these challenges and strengthen their cybersecurity posture.
\