Ep. 232 Harnessing AI and ML for Smarter Cybersecurity
Feds At The Edge by FedInsider
Release Date: 01/22/2026
Feds At The Edge by FedInsider
Preparation is everything when it comes to AI in government. This week on Feds At the Edge, experts from the Library of Congress, Fortinet Federal, Pryon, Dell Technologies and Data Evolution share practical insights on moving beyond “lift and shift” approaches, selecting the right tools, and ensuring data is truly AI-ready. From treating AI tools as “perishable as tomatoes” to rethinking legacy data and modern migration strategies, the conversation highlights the importance of strong data foundations, thoughtful implementation, and...
info_outlineFeds At The Edge by FedInsider
Data is the lifeblood of AI, and when it’s incomplete, biased, or inaccurate, your results will be abysmal. This week on Feds At the Edge, we sit down with Geoff Schaefer of Leidos and Susan Laine from Quest to discuss how to overcome the common pitfalls and data challenges of federal AI adoption. Our guests explore the shift toward data platforms that include curated, reusable data products that improve visibility, assign trust scores, and clarify data sources and permissions. Tune in on your favorite...
info_outlineFeds At The Edge by FedInsider
Professional sports reward those who perform under pressure. In federal technology, the stakes are even higher. This week on Feds At the Edge, we sit down with experts navigating the realities of securing federal systems in an environment where threats are constant and decisions carry real consequences. Gary Barlet, Public Sector CTO for Illumio, poses a critical question: “Do you have a plan for what happens when a malicious actor breaches your system?” He explains how segmentation can stop attackers from being able to “land and...
info_outlineFeds At The Edge by FedInsider
In order to determine its value, Federal Technology leaders know it’s all about the workflow when it comes to the possibility of incorporating AI. Once they do, having a deeper understanding of the distinction between traditional and generative AI, as well as the importance of data cleanliness and security will be key for an effective adoption. This week at Feds At the Edge, we outline the steps agencies should know and take to take as they prepare to expand into the newest digital landscape. From defining terms, to ensuring clean and secure data, to identifying and removing...
info_outlineFeds At The Edge by FedInsider
We have all seen the power of AI; the question is, can it be implemented in a secure federal environment? This week on Feds At the Edge, we sit down with three experts who are proving that powerful AI can be deployed securely in federal environments, without compromising compliance or mission outcomes. Leaders from the Library of Congress, Idaho National Lab, and Keysight share how responsible implementation, curated data, and private AI models are unlocking transformative results. You’ll hear how agencies are navigating...
info_outlineFeds At The Edge by FedInsider
What if better visibility into your IT assets could unlock cost savings, strengthen security, and free teams to focus on the mission? This week on Feds At the Edge, we explore how federal agencies are turning digital modernization into a strategic advantage by strengthening software and asset visibility. With a clearer understanding of existing licenses, agencies can eliminate duplication, retire unused tools, and collaborate across organizations to secure better pricing and maximize value. The conversation also highlights how AI is...
info_outlineFeds At The Edge by FedInsider
Trust is difficult enough in an environment with strict controls and security; AI adds dimensions that make establishing trust even more challenging in the public sector. Over the last decade, if we have learned anything, it’s that check box solutions never work. This week on Feds At the Edge, we break down what it takes to build trustworthy AI in high-stakes government environments. From model transparency and “model cards” to the risks hidden in data and the importance of context, they explore how leaders can evaluate trust across...
info_outlineFeds At The Edge by FedInsider
How do you upgrade a global fleet when failure isn't an option? This week on Feds At the Edge, we dive into the Navy's "Operation Cattle Drive," an ambitious initiative to modernize technology across hundreds of ships in the world’s most challenging environments. We sit down with experts from the U.S. Navy and Red Hat to break down the three pillars of high-stakes digital transformation: Development: Using digital twins to test systems in advance—eliminating risk where failure isn’t an...
info_outlineFeds At The Edge by FedInsider
AI presents such a dazzling set of opportunities that federal leaders can be tempted to dive in without careful planning. This week on Feds At the Edge, we move past the hype to explore the tactical realities of deploying AI within the unique constraints of the federal environment. Ashley Billman, Cybersecurity Analyst, Pacific Northwest National Laboratory, explains why agencies must align AI architecture with mission and security needs, whether on-prem, hybrid, or cloud environments, and highlights a critical question: what’s actually in the training data, and...
info_outlineFeds At The Edge by FedInsider
AI has the power to transform government operations, but only if it’s used wisely. This week on Feds At the Edge, we dive into the high-stakes world of applied AI within public agencies, where the potential for massive efficiency gains sits right next to the risk of moving too fast without a map. From Todd Sharkey of Lorain County, OH’s look at the document "drowning" in many government organizations to Brandon Ragle at Illinois Department of Innovation and Technology’s vital warnings on data privacy and...
info_outlineToday, we hear how to leverage the much-vaunted AI and ML technologies to make practical cybersecurity improvements for the federal government. The analysis includes comments about setting a base line, prioritizing alerts and a quick dive into the characteristics of Operational Technology (OT).
BASELINE: Signature-based risk analysis has proven to be easy to deceive. Alex Maier from August Schell suggests that the solution is a move to a “behavior” based tool. In other words, see where a user's behavior varies from the norm. If that is the case, then you must know what “typical” is all about and begin by observing typical patterns to discern noticeable differences.
AERTS: Some estimates suggest that a Security Operations Center (SOC) can receive 10,000 alerts a day. It is no wonder operators suffer from “alert fatigue” and miss problems. Rubrik has technology that can establish a risk-based alerting system to filter out low-level concerns.
ELEMENTS OF OT: Mark Hadley of Pacific Northwest National Laboratory describes OT as deterministic. That is to say, given a signal, always produce the same output with a fixed set of rules. Given that understanding, a heighted importance must be given to the value of the specific commands given to OT devices.
The discussion also covered the need for transparency and accountability, as well as the potential risks of AI-based attacks.