Ep. 221 Building on the Zero Trust Foundation
Feds At The Edge by FedInsider
Release Date: 10/16/2025
Feds At The Edge by FedInsider
Trust is difficult enough in an environment with strict controls and security; AI adds dimensions that make establishing trust even more challenging in the public sector. Over the last decade, if we have learned anything, it’s that check box solutions never work. This week on Feds At the Edge, we break down what it takes to build trustworthy AI in high-stakes government environments. From model transparency and “model cards” to the risks hidden in data and the importance of context, they explore how leaders can evaluate trust across...
info_outlineFeds At The Edge by FedInsider
How do you upgrade a global fleet when failure isn't an option? This week on Feds At the Edge, we dive into the Navy's "Operation Cattle Drive," an ambitious initiative to modernize technology across hundreds of ships in the world’s most challenging environments. We sit down with experts from the U.S. Navy and Red Hat to break down the three pillars of high-stakes digital transformation: Development: Using digital twins to test systems in advance—eliminating risk where failure isn’t an...
info_outlineFeds At The Edge by FedInsider
AI presents such a dazzling set of opportunities that federal leaders can be tempted to dive in without careful planning. This week on Feds At the Edge, we move past the hype to explore the tactical realities of deploying AI within the unique constraints of the federal environment. Ashley Billman, Cybersecurity Analyst, Pacific Northwest National Laboratory, explains why agencies must align AI architecture with mission and security needs, whether on-prem, hybrid, or cloud environments, and highlights a critical question: what’s actually in the training data, and...
info_outlineFeds At The Edge by FedInsider
AI has the power to transform government operations, but only if it’s used wisely. This week on Feds At the Edge, we dive into the high-stakes world of applied AI within public agencies, where the potential for massive efficiency gains sits right next to the risk of moving too fast without a map. From Todd Sharkey of Lorain County, OH’s look at the document "drowning" in many government organizations to Brandon Ragle at Illinois Department of Innovation and Technology’s vital warnings on data privacy and...
info_outlineFeds At The Edge by FedInsider
I isn’t here to replace government professionals, it’s here to elevate them. Artificial intelligence is still new territory for many public sector leaders, but understanding how to apply it effectively can unlock major gains in productivity and insight. This week on Feds At the Edge, we dive into the essential transition for government professionals: offloading routine tasks to AI so humans can reclaim high-level analytical work. Dr. Nancy Washton breaks down the critical distinction between...
info_outlineFeds At The Edge by FedInsider
What if the solution to our most daunting infrastructure challenges isn't just more concrete, but more clarity? This week on Feds At the Edge, we explore how cutting-edge technology is turning budget constraints into opportunities for smarter, more sustainable growth. Experts from VHB, Portland Bureau of Transportation, Georgia Department of Transportation, Bentley Systems, Inc, and Reynolds, Smith & Hills, discuss how leveraging digital twins - dynamic software-based replicas of physical...
info_outlineFeds At The Edge by FedInsider
Citizens expect government services to work seamlessly on their phones, and agencies are moving quickly to adapt. But simply extending legacy systems to mobile can leave critical security and usability gaps. This week on Feds At the Edge, experts from California DMV and SailPoint break down three key lessons for building trusted, modern access. First, MFA alone is no longer enough. As attackers find ways around one-time codes, organizations are shifting from basic identity checks to stronger, continuous authentication approaches. ...
info_outlineFeds At The Edge by FedInsider
What does a massive county-based state like North Dakota have in common with a compact, town-centered state like Vermont? More than you’d think, and the stakes for their data have never been higher. This week on Feds At the Edge, experts from North Dakota Information Technology, State of Vermont Agency Digital Services, and Palo Alto explore how states bridge geographical and administrative divides to secure their digital future. Despite stark differences in scale and structure, both faces universal challenges: managing massive data...
info_outlineFeds At The Edge by FedInsider
Most practitioners building cybersecure environments know the basics: simplify system procedures, invest in continuous education, and elevate visibility across the network. But what happens when new mandates are applied to legacy systems? The “bolt-on” approach is often expensive, frustrating, and ineffective. This week on Feds At the Edge, experts from NETCOM, DARPA, and Axonius discuss how automation, AI, and continuous...
info_outlineFeds At The Edge by FedInsider
Today, we hear how to leverage the much-vaunted AI and ML technologies to make practical cybersecurity improvements for the federal government. The analysis includes comments about setting a base line, prioritizing alerts and a quick dive into the characteristics of Operational Technology (OT). BASELINE: Signature-based risk analysis has proven to be easy to deceive. Alex Maier from August Schell suggests that the solution is a move to a “behavior” based tool. In other words, see where a user's behavior varies from the norm. If that is the case, then you must know what “typical” is all...
info_outline
Implementing Zero Trust in federal environments requires more than technology, it demands a clear strategy for managing and protecting data.
CISA recently updated its Continuous Diagnostics and Mitigation (CDM) Data Model Document (DMD), highlighting the most critical changes without requiring a full review of the entire framework.
This week on Feds At the Edge, our panel of experts unpack some of the expanded concepts and explore some of the challenges and practical strategies for implementing DMD.
Daniel Bane, Supervisory IT Specialist, TSA, highlights the complexity of reporting data from dozens of diverse systems and the tools needed to do it efficiently. While Mark Hadley, Chief Cybersecurity Researcher, Pacific Northwest Labs, explains the limitations posed by privately-owned critical infrastructure. And Brian "Stretch" Meyer, Field Chief Technology Officer, Axonius Federal, offers practical insights on how tool updates can disrupt compliance processes if not carefully managed.
Tune in on your favorite podcast today to gain valuable insights into how agencies can apply the DMD practically, align data strategy with Zero Trust goals, and navigate the complexities of federal environments.