Ep. 201 Emerging Technology Series – Cybersecurity
Feds At The Edge by FedInsider
Release Date: 05/20/2025
Feds At The Edge by FedInsider
In today’s episode, we get the unvarnished truth about making the difficult transition from federal on-prem networks to the cloud. Michael Howard, US Transportation Command, gives a thorough analysis of topics like containers, cloud service providers, and specific benefits of cloud native applications. He has experience in enterprise-level commercial organizations, enabling him to compare available tools with those approved for a secure environment like the DoD. He begins by stating that his area of responsibility is making a transition away from the traditional...
info_outlineFeds At The Edge by FedInsider
Here is the link to the free webinar on August 27, 2025 2pm EDT Cybersecurity teams are facing a “perfect storm” - more attacks, fewer defenders, and outdated infrastructure. This week on Feds At The Edge, we offer a sneak peek into an upcoming webinar that will teach you how to truly see what’s happening on your network- moving beyond basic monitoring to actionable observation. Brian Chamberlain, Account Executive, USMC/USN, SolarWinds, Chamberlain breaks down why simple monitoring isn’t enough. Without pinpointing blind spots or knowing where to start, agencies waste...
info_outlineFeds At The Edge by FedInsider
Everyone knows it’s not just about having data, it’s about having the right data. This week on Feds At The Edge, we’re diving into how federal and state agencies are transforming raw data into trusted, actionable insights that drive better outcomes. Our expert panel breaks down how data modeling is bridging the gap between collection and impact: Natalie Evans Harris, CDO for the State of Maryland, reveals how trust begins with engaging staff, educating users, and gathering feedback. Marcus Thornton, Deputy CDO for the Commonwealth of Virginia,...
info_outlineFeds At The Edge by FedInsider
When new technology is introduced, people may not take advantage of the advanced capabilities. The transition to a Zero Trust methodology is causing federal leaders to abandon traditional methods of compliance. Keith Busby from CMS sums up the problem nicely. Some of the systems he supports serves the needs of 150 million Americans. If they don’t leverage the capabilities of the cloud, then they will never be able to move to a much more secure Zero Trust Architecture. Shane Barney from USCIS provides even more shocking numbers. He casually mentions on his log...
info_outlineFeds At The Edge by FedInsider
Any individual would know keeping operating systems up to date is a no-brainer when it comes to cybersecurity. But what happens when you’re managing an estimated seven million devices? This is the challenge for the Department of Defense. This week on Feds At The Edge, we unpack the concept of applying Security Technical Implementation Guides, otherwise known as STIG, crucial tools for configuration management. Dr. Kurt Jarvis, Technical Director for Cyber for the Air Force Sustainment Center, explains why each environment's unique risk profile makes STIG essential...
info_outlineFeds At The Edge by FedInsider
Fifteen years ago, “continuous monitoring” was as simple as watching a single server down the hall. Today, it’s a high-stakes mission across sprawling hybrid networks being bombarded with data and under constant security threats. This week on Feds At The Edge, we explore how federal agencies are modernizing the once-simple concept of Continuous Diagnostics and Mitigation (CDM) to protect complex, data-heavy systems. Jason Ralph, Director of Security Operations for the Department of Labor, shares candid insights on deploying new CDM...
info_outlineFeds At The Edge by FedInsider
As cyber threats grow more sophisticated, federal agencies need security that can think on its feet. This week on Feds At The Edge, we explore how agencies are evolving toward Zero Trust by implementing dynamic security—a flexible approach that adjusts access and authentication in real time based on context and behavior. Justin Chin, Director of the Government Solutions Segment at Ping Identity, opens with a relatable example: when your bank flags suspicious login activity and adds a second layer of authentication. That adaptive friction...
info_outlineFeds At The Edge by FedInsider
Everyone wants a secure network, but how do you prove it? This week on Feds At The Edge, we speak with cybersecurity experts to discuss how to establish meaningful cybersecurity metrics to document that security. LtCol Natalie Lamb, Cybersecurity Division OIC, Cyberspace Operations Group in the USMC, and Brian "Stretch" Meyer, Sr. Director of Engineering at Axonius Federal, breaks down three essential areas for leaders to focus on: 1. Aligning Investments - With limited time and funding, agencies must prioritize cybersecurity efforts that support...
info_outlineFeds At The Edge by FedInsider
Everyone knows automation is powerful, but it’s also a double-edged sword. This week on Feds At The Edge, we speak with cybersecurity experts who share how to securely align automation with Zero Trust principles. We spend the hour diving to importance of shared responsibility models, protecting critical surfaces, and using automation to enhance observability and control, especially in cloud environments. Michael Hardee, Chief Architect for Red Hat, shares insights on how automation can reduce social engineering risks by eliminating human override. While Don...
info_outlineFeds At The Edge by FedInsider
The theme of the current administration is to do more with less. Today, we hear from experts on how they have assisted in implementing Zero Trust by leveraging all resources possible. We know implementing Zero Trust is a continuous process; David Bottom from the SEC provides guidelines on what to review constantly. He suggests focusing on decreasing privileges, patching systems, and learning how to extract meaningful signals from the flood of data entering the federal government. None of this can be done without cooperation across the agency. As an example of working with others,...
info_outlineAutomation is everywhere—but is it helping us, or quietly introducing new risks?
This week on Feds At The Edge we share a special three-part series that explores the evolving role of automation in cybersecurity- from its promise to its pitfalls. In session one, we lay the groundwork with a high-level view of automation’s true purpose and challenges. We follow up with session two- digging into application security and the critical role of cloud telemetry. And we wrap up this hour with insights into threat intelligence, risk visability ahd how to stay ahead of evolving threats.
Featuring experts from the Department of Labor, DOD, Peraton, Checkmarx and Team Cymru, tune in on your favorite podcasting platform to hear our grounded, real-world look at what automation means today- and where its headed.