Ep. 192 AI promises to Unlock Research Potential to Solve Big Changes
Feds At The Edge by FedInsider
Release Date: 03/19/2025
Feds At The Edge by FedInsider
In today’s episode, we get the unvarnished truth about making the difficult transition from federal on-prem networks to the cloud. Michael Howard, US Transportation Command, gives a thorough analysis of topics like containers, cloud service providers, and specific benefits of cloud native applications. He has experience in enterprise-level commercial organizations, enabling him to compare available tools with those approved for a secure environment like the DoD. He begins by stating that his area of responsibility is making a transition away from the traditional...
info_outlineFeds At The Edge by FedInsider
Here is the link to the free webinar on August 27, 2025 2pm EDT Cybersecurity teams are facing a “perfect storm” - more attacks, fewer defenders, and outdated infrastructure. This week on Feds At The Edge, we offer a sneak peek into an upcoming webinar that will teach you how to truly see what’s happening on your network- moving beyond basic monitoring to actionable observation. Brian Chamberlain, Account Executive, USMC/USN, SolarWinds, Chamberlain breaks down why simple monitoring isn’t enough. Without pinpointing blind spots or knowing where to start, agencies waste...
info_outlineFeds At The Edge by FedInsider
Everyone knows it’s not just about having data, it’s about having the right data. This week on Feds At The Edge, we’re diving into how federal and state agencies are transforming raw data into trusted, actionable insights that drive better outcomes. Our expert panel breaks down how data modeling is bridging the gap between collection and impact: Natalie Evans Harris, CDO for the State of Maryland, reveals how trust begins with engaging staff, educating users, and gathering feedback. Marcus Thornton, Deputy CDO for the Commonwealth of Virginia,...
info_outlineFeds At The Edge by FedInsider
When new technology is introduced, people may not take advantage of the advanced capabilities. The transition to a Zero Trust methodology is causing federal leaders to abandon traditional methods of compliance. Keith Busby from CMS sums up the problem nicely. Some of the systems he supports serves the needs of 150 million Americans. If they don’t leverage the capabilities of the cloud, then they will never be able to move to a much more secure Zero Trust Architecture. Shane Barney from USCIS provides even more shocking numbers. He casually mentions on his log...
info_outlineFeds At The Edge by FedInsider
Any individual would know keeping operating systems up to date is a no-brainer when it comes to cybersecurity. But what happens when you’re managing an estimated seven million devices? This is the challenge for the Department of Defense. This week on Feds At The Edge, we unpack the concept of applying Security Technical Implementation Guides, otherwise known as STIG, crucial tools for configuration management. Dr. Kurt Jarvis, Technical Director for Cyber for the Air Force Sustainment Center, explains why each environment's unique risk profile makes STIG essential...
info_outlineFeds At The Edge by FedInsider
Fifteen years ago, “continuous monitoring” was as simple as watching a single server down the hall. Today, it’s a high-stakes mission across sprawling hybrid networks being bombarded with data and under constant security threats. This week on Feds At The Edge, we explore how federal agencies are modernizing the once-simple concept of Continuous Diagnostics and Mitigation (CDM) to protect complex, data-heavy systems. Jason Ralph, Director of Security Operations for the Department of Labor, shares candid insights on deploying new CDM...
info_outlineFeds At The Edge by FedInsider
As cyber threats grow more sophisticated, federal agencies need security that can think on its feet. This week on Feds At The Edge, we explore how agencies are evolving toward Zero Trust by implementing dynamic security—a flexible approach that adjusts access and authentication in real time based on context and behavior. Justin Chin, Director of the Government Solutions Segment at Ping Identity, opens with a relatable example: when your bank flags suspicious login activity and adds a second layer of authentication. That adaptive friction...
info_outlineFeds At The Edge by FedInsider
Everyone wants a secure network, but how do you prove it? This week on Feds At The Edge, we speak with cybersecurity experts to discuss how to establish meaningful cybersecurity metrics to document that security. LtCol Natalie Lamb, Cybersecurity Division OIC, Cyberspace Operations Group in the USMC, and Brian "Stretch" Meyer, Sr. Director of Engineering at Axonius Federal, breaks down three essential areas for leaders to focus on: 1. Aligning Investments - With limited time and funding, agencies must prioritize cybersecurity efforts that support...
info_outlineFeds At The Edge by FedInsider
Everyone knows automation is powerful, but it’s also a double-edged sword. This week on Feds At The Edge, we speak with cybersecurity experts who share how to securely align automation with Zero Trust principles. We spend the hour diving to importance of shared responsibility models, protecting critical surfaces, and using automation to enhance observability and control, especially in cloud environments. Michael Hardee, Chief Architect for Red Hat, shares insights on how automation can reduce social engineering risks by eliminating human override. While Don...
info_outlineFeds At The Edge by FedInsider
The theme of the current administration is to do more with less. Today, we hear from experts on how they have assisted in implementing Zero Trust by leveraging all resources possible. We know implementing Zero Trust is a continuous process; David Bottom from the SEC provides guidelines on what to review constantly. He suggests focusing on decreasing privileges, patching systems, and learning how to extract meaningful signals from the flood of data entering the federal government. None of this can be done without cooperation across the agency. As an example of working with others,...
info_outlineEveryone is trying to unlock Artificial Intelligence's promise. We have seen generative AI tricks that can summarize long documents in a flash, which is substantially different from the requirements of serious federal research.
Today, we examined some challenges scientific communities experience in applying AI. Quentin Kerilman from the PNN labs throws some icy water on AI enthusiasts when he cautions that using AI for many sensitive applications has no framework. Leaders must use their best judgment when including data sets in projects.
Ramesh Menon from the DIA warns that careful data collection must still be used. For example, one must use fair, unbiased data. Is the AI appropriately documented? Further, a scientist will always need multiple data modalities. When used in AI, it needs to be appropriately tagged.
Medical data has much theoretical value from AI. But this is the exact data that has double and triple protection. What about leaks and backdoors?
Despite all the challenges presented, transparency, human oversight, and collaboration were emphasized to ensure AI's practical and responsible use.