loader from loading.io

Ep. 204 Harnessing Automation to Reach Zero Trust

Feds At The Edge by FedInsider

Release Date: 06/12/2025

Ep. 213 From Chaos to Clarity: Using Cloud to Streamline IT Services Across Agencies show art Ep. 213 From Chaos to Clarity: Using Cloud to Streamline IT Services Across Agencies

Feds At The Edge by FedInsider

In today’s episode, we get the unvarnished truth about making the difficult transition from federal on-prem networks to the cloud.   Michael Howard, US Transportation Command, gives a thorough analysis of topics like containers, cloud service providers, and specific benefits of cloud native applications. He has experience in enterprise-level commercial organizations, enabling him to compare available tools with those approved for a secure environment like the DoD.   He begins by stating that his area of responsibility is making a transition away from the traditional...

info_outline
Ep. 211 Empowering Federal Agencies with Optimized Operations (preview) show art Ep. 211 Empowering Federal Agencies with Optimized Operations (preview)

Feds At The Edge by FedInsider

Here is the link to the free webinar on August 27, 2025 2pm EDT Cybersecurity teams are facing a “perfect storm” - more attacks, fewer defenders, and outdated infrastructure.  This week on Feds At The Edge, we offer a sneak peek into an upcoming webinar that will teach you how to truly see what’s happening on your network- moving beyond basic monitoring to actionable observation.  Brian Chamberlain, Account Executive, USMC/USN, SolarWinds, Chamberlain breaks down why simple monitoring isn’t enough. Without pinpointing blind spots or knowing where to start, agencies waste...

info_outline
Ep. 210 Data Modeling for State and Local Governments show art Ep. 210 Data Modeling for State and Local Governments

Feds At The Edge by FedInsider

Everyone knows it’s not just about having data, it’s about having the right data.     This week on Feds At The Edge, we’re diving into how federal and state agencies are transforming raw data into trusted, actionable insights that drive better outcomes.  Our expert panel breaks down how data modeling is bridging the gap between collection and impact:  Natalie Evans Harris, CDO for the State of Maryland, reveals how trust begins with engaging staff, educating users, and gathering feedback.  Marcus Thornton, Deputy CDO for the Commonwealth of Virginia,...

info_outline
Ep. 209 Cloud Native Application Security Lifting Zero Trust into the Clouds show art Ep. 209 Cloud Native Application Security Lifting Zero Trust into the Clouds

Feds At The Edge by FedInsider

When new technology is introduced, people may not take advantage of the advanced capabilities. The transition to a Zero Trust methodology is causing federal leaders to abandon traditional methods of compliance.  Keith Busby from CMS sums up the problem nicely.  Some of the systems he supports serves the needs of 150 million Americans.  If they don’t leverage the capabilities of the cloud, then they will never be able to move to a much more secure Zero Trust Architecture. Shane Barney from USCIS provides even more shocking numbers.  He casually mentions on his log...

info_outline
Ep. 208 Talking Tech: Simplifying STIG Compliance with Unified Automation show art Ep. 208 Talking Tech: Simplifying STIG Compliance with Unified Automation

Feds At The Edge by FedInsider

Any individual would know keeping operating systems up to date is a no-brainer when it comes to cybersecurity. But what happens when you’re managing an estimated seven million devices? This is the challenge for the Department of Defense.   This week on Feds At The Edge, we unpack the concept of applying Security Technical Implementation Guides, otherwise known as STIG, crucial tools for configuration management.  Dr. Kurt Jarvis, Technical Director for Cyber for the Air Force Sustainment Center, explains why each environment's unique risk profile makes STIG essential...

info_outline
Ep. 207 Cyber Leaders Modernizing the CDM Program show art Ep. 207 Cyber Leaders Modernizing the CDM Program

Feds At The Edge by FedInsider

Fifteen years ago, “continuous monitoring” was as simple as watching a single server down the hall. Today, it’s a high-stakes mission across sprawling hybrid networks being bombarded with data and under constant security threats.   This week on Feds At The Edge, we explore how federal agencies are modernizing the once-simple concept of Continuous Diagnostics and Mitigation (CDM) to protect complex, data-heavy systems.   Jason Ralph, Director of Security Operations for the Department of Labor, shares candid insights on deploying new CDM...

info_outline
Ep. 206  Dynamic Security: Central to Achieving Zero Trust show art Ep. 206 Dynamic Security: Central to Achieving Zero Trust

Feds At The Edge by FedInsider

As cyber threats grow more sophisticated, federal agencies need security that can think on its feet.    This week on Feds At The Edge, we explore how agencies are evolving toward Zero Trust by implementing dynamic security—a flexible approach that adjusts access and authentication in real time based on context and behavior.      Justin Chin, Director of the Government Solutions Segment at Ping Identity, opens with a relatable example: when your bank flags suspicious login activity and adds a second layer of authentication. That adaptive friction...

info_outline
Ep. 205 Metrics Matter: Measure your Cybersecurity Success show art Ep. 205 Metrics Matter: Measure your Cybersecurity Success

Feds At The Edge by FedInsider

Everyone wants a secure network, but how do you prove it?  This week on Feds At The Edge, we speak with cybersecurity experts to discuss how to establish meaningful cybersecurity metrics to document that security.  LtCol Natalie Lamb, Cybersecurity Division OIC, Cyberspace Operations Group in the USMC, and Brian "Stretch" Meyer, Sr. Director of Engineering at Axonius Federal, breaks down three essential areas for leaders to focus on:   1.     Aligning Investments - With limited time and funding, agencies must prioritize cybersecurity efforts that support...

info_outline
Ep. 204 Harnessing Automation to Reach Zero Trust show art Ep. 204 Harnessing Automation to Reach Zero Trust

Feds At The Edge by FedInsider

Everyone knows automation is powerful, but it’s also a double-edged sword.   This week on Feds At The Edge, we speak with cybersecurity experts who share how to securely align automation with Zero Trust principles. We spend the hour diving to importance of shared responsibility models, protecting critical surfaces, and using automation to enhance observability and control, especially in cloud environments.  Michael Hardee, Chief Architect for Red Hat, shares insights on how automation can reduce social engineering risks by eliminating human override. While Don...

info_outline
Ep. 203 Building Zero Trust on a Sound Foundation show art Ep. 203 Building Zero Trust on a Sound Foundation

Feds At The Edge by FedInsider

The theme of the current administration is to do more with less. Today, we hear from experts on how they have assisted in implementing Zero Trust by leveraging all resources possible.  We know implementing Zero Trust is a continuous process; David Bottom from the SEC provides guidelines on what to review constantly. He suggests focusing on decreasing privileges, patching systems, and learning how to extract meaningful signals from the flood of data entering the federal government. None of this can be done without cooperation across the agency. As an example of working with others,...

info_outline
 
More Episodes

Everyone knows automation is powerful, but it’s also a double-edged sword.  

This week on Feds At The Edgewe speak with cybersecurity experts who share how to securely align automation with Zero Trust principles. We spend the hour diving to importance of shared responsibility models, protecting critical surfaces, and using automation to enhance observability and control, especially in cloud environments. 

Michael Hardee, Chief Architect for Red Hat, shares insights on how automation can reduce social engineering risks by eliminating human override. While Don Yeske, Director, National Security Cyber Division at DHS, highlights how AI can uncover vulnerabilities in outdated enterprise architectures, including a recent zero-day attack. 

Both experts emphasize the “human-in-the-loop" approach, agreeing that automation should augment, not replace, human insight. As Michael Hardee reminds us, “automation is not a license for us to check out.”  

Tune in on your favorite podcast platform today!