Look for any podcast host, guest or anyone
Showing episodes and shows of

FedInsider

Shows

Feds at the EdgeFeds at the EdgeEp. 203 Building Zero Trust on a Sound Foundation The theme of the current administration is to do more with less. Today, we hear from experts on how they have assisted in implementing Zero Trust by leveraging all resources possible.  We know implementing Zero Trust is a continuous process; David Bottom from the SEC provides guidelines on what to review constantly. He suggests focusing on decreasing privileges, patching systems, and learning how to extract meaningful signals from the flood of data entering the federal government. None of this can be done without cooperation across the agency. As an example of working with others, David B...2025-06-0358 minFeds at the EdgeFeds at the EdgeEp. 202 Transforming Government Customer Service with New TechnologyOne of the greatest promises of modern technology is its ability to streamline complex, paper-based systems - cutting costs, improving access, and eliminating waste, fraud, and abuse.   These complicated systems are often the biproduct of a complicated network, like the ones you find in the Department of Labor which are handling unemployment insurance claims fifty different ways in fifty different states. Or how military members and their families often have to handle an issue when they are thousands of miles from home and might not easily have access.  This week on Feds At The Edge, we e...2025-05-2858 minFeds at the EdgeFeds at the EdgeEp. 201 Emerging Technology Series – CybersecurityAutomation is everywhere—but is it helping us, or quietly introducing new risks?  This week on Feds At The Edge we share a special three-part series that explores the evolving role of automation in cybersecurity- from its promise to its pitfalls. In session one, we lay the groundwork with a high-level view of automation’s true purpose and challenges. We follow up with session two- digging into application security and the critical role of cloud telemetry. And we wrap up this hour with insights into threat intelligence, risk visability ahd how to stay ahead of evolving threats.    ...2025-05-2059 minFeds at the EdgeFeds at the EdgeEp. 200 5G to The BattlefieldIn recent years, the Department of Defense has been rethinking how it approaches communications technology—shifting from traditional, insular solutions to embracing innovation from the commercial sector. While off-the-shelf cellular devices aren’t suitable for the battlefield, the underlying technologies powering 5G and emerging 6G networks are becoming too valuable to ignore.   This week on Feds At The Edge, we explore how the military can harness advanced commercial technologies like 5G, 6G, and AI to enhance battlefield operations. The discussion centers on three critical considerations:   Edge Computing for Resilience: In combat zones where communication links are vulnerab...2025-05-1448 minFeds at the EdgeFeds at the EdgeEp. 199 Protecting Healthcare Identity from Modern Cyber AttackThe 2023 FBI Internet Crime Report reveals that nearly 21% of ransomware attacks targeted the healthcare and public health sectors—making them the top victims.   This week on Feds At The Edge, we explore how agencies can defend against these growing threats.   Benjamin Koshy, Chief Information Security Officer and Director, Division of Information Security of Indian Health Service, explains the unique identity management challenge in healthcare: balancing open patient access with strict data protection.  Keith Busby, Acting CISO at CMS, outlines how to go beyond Zero Trust with real-world risk assessments and robust incident response plans - n...2025-05-0759 minFeds at the EdgeFeds at the EdgeEp. 198 Identity Governance and Zero Trust - Best Practices for a Multi-Cloud EnvironmentToday’s modern network has placed identity management in the forefront to manage a plethora of landscapes – on and off prem, public and private, hybrid, and the new kid on the block, alt-clouds.  This week on Feds At The Edge, we explore how the Defense Information Systems Agency (DISA) is leading the charge in modern identity management, once a backwater concept, to center stage, with its ambitious program, Thunderdome.   Chris Pymm, Portfolio Manager, Zero Trust & Division Chief for ID7 at DISA, shares how Thunderdome spans 50 sites and 12,000 users, automating identity controls to outpace threats like lateral mo...2025-04-3058 minFeds at the EdgeFeds at the EdgeEp. 197 Secure By Design: Driving Government Modernization Through Secure Development Practices“Shift Left” is a popular phrase in software development used to represent the idea of prioritizing certain tasks earlier in the life cycle process to avoid or easily identify potential problems before it moves on.   This week on Feds At The Edge, we ask the question – What does it take and what does it really mean to “shift left.” Our expert guests share practical insights on tackling the complex realities of modern software design and deployment.   Amit Madan, Chief Architect, Center for Enterprise Modernization at Mitre, recommends preparing for potential gaps when integrating legacy systems with modern, clo...2025-04-2358 minFeds at the EdgeFeds at the EdgeEp. 196 Accelerating Cloud Migration for AgenciesAs federal agencies move toward greater efficiency, cloud adoption is making the transition from optional to essential. But Federal leaders know not every system is a good candidate.   This week on Feds At The Edge, our expert guests share what agencies will need to know in order to identify which of their systems can move to the cloud and which systems are best suited to remain on-prem.   David Updike, CTO and Director for the Office of Digital Services & Technology Architecture at EPA, explains how cost frameworks reveal trade-offs between flexibility and savings, and the importance of A...2025-04-1657 minFeds at the EdgeFeds at the EdgeEp. 195 Creating a Zero Trust EcosystemZero Trust is more than a technology shift, it’s a cultural one.  This week on Feds At The Edge, our expert guests explore how agencies can successfully implement Zero Trust by focusing on people, leveraging AI, and understanding risk at every level.   With over 600,000 employees and 1,000 applications, the USPS faced a massive challenge. Heather Dyer, VP & Chief Information Security Officer for the USPS, shares how clear communication, continuous monitoring, and behavioral insights were key to driving adoption. Joined by Prem Jadhwani, CTO at Government Acquisitions Inc, the discussion dives into understanding risk, managing access to crit...2025-04-0958 minFeds at the EdgeFeds at the EdgeEp. 194 Bringing Together Cloud Flexibility & AI Power   The cloud offers incredible potential, are you making the most of it?     This week on Feds At The Edge, our expert guests explore three key strategies for utilizing AI to optimize potential, lighten workloads and ensure security in the hybrid and cloud work landscape.    >> AI for Smarter Cloud Management: Kevin Walsh, Director, Information Technology and Cybersecurity Team at GAO, suggests turning your focus on what we’ve learned from past use cases, especially for those who are overwhelmed with the idea of where to even begin their integration journey.    2025-04-0359 minFeds at the EdgeFeds at the EdgeEp. 193 Adding System Observability to Monitoring for a Holistic ViewDigital transformation has been a federal buzzword for years, but what’s the first step in making it a reality? It all starts with knowing what’s on your network and being able to monitor it before and during a transition.     This week on Feds At the Edge, our expert guests take a deep dive into the future of network monitoring and digital transformation.     Tom Gilmore, Enterprise Data Architect in the USMC, drops a staggering statistic: in just 2.5 years, over 15,000 applications were built and deployed across the Marine Corps—many of which are li...2025-03-2657 minFeds at the EdgeFeds at the EdgeEp. 192 AI promises to Unlock Research Potential to Solve Big Changes Everyone is trying to unlock Artificial Intelligence's promise. We have seen generative AI tricks that can summarize long documents in a flash, which is substantially different from the requirements of serious federal research. Today, we examined some challenges scientific communities experience in applying AI. Quentin Kerilman from the PNN labs throws some icy water on AI enthusiasts when he cautions that using AI for many sensitive applications has no framework. Leaders must use their best judgment when including data sets in projects. Ramesh Menon from the DIA warns that careful data collection must still be...2025-03-191h 00Feds at the EdgeFeds at the EdgeEp. 191 Transforming Public Sector Leadership with Data-Driven DecisionsWhen the Federal Chief Data Officer (CDO) role was first introduced, simply knowing where data was stored and how to secure it was a major accomplishment. Today, CDOs are expected to be strategic leaders, driving data-driven decision-making across federal agencies. But how can they successfully make this transition?    This week on Feds At the Edge, our expert guests provide a roadmap for CDOs looking to expand their influence. Arjuna Rivera, Senior Solutions Engineer at Atlassian, kicks off the discussion by outlining seven key considerations for obtaining actionable, high-quality data—emphasizing the importance of clean, unbiased data, ca...2025-03-1056 minFeds at the EdgeFeds at the EdgeEp. 190 The Future of 5G TechnologyDespite the official launch of 5G networks in 2018, their full potential for federal applications has yet to be realized.     This week on Feds At the Edge, we explore the value of a mature 5G network and the groundbreaking possibilities of its next evolution.     Sal D'Itri, Chairman of National Spectrum Consortium, introduces the concept of a “network in a box,” an on-demand, scalable solution that enables rapid adaptation to changing workloads.     Steve Vogelsang, CTO Federal at Nokia Federal Solutions, discusses the need for better device ecosystems, the potential for 5G in em...2025-03-0555 minFeds at the EdgeFeds at the EdgeEp. 189 Bringing Automation to Cloud Risk ManagementWith cyberthreats on constant rise, Federal Leaders consider what role automation can play in managing cloud involvement and best practices to ensure their commitment to securing the nation’s data.   This week on Feds At the Edge, we explore the role of AI, governance, and collaboration in strengthening security and improving capabilities and data security.  Joseph Ronzio, Deputy Chief Health Technology Officer, Veterans Health Administration, talks about the risks of blind patching and the benefits of a hybrid approach—combining automation with manual oversight.   Brian "Stretch" Meyer, Sr. Director of Engineering, Axonius Federal, sheds ligh...2025-02-2556 minFeds at the EdgeFeds at the EdgeEp. 188 IT Disaster Recovery is More than Rebooting SystemsDespite federal mandates requiring every agency to have a disaster recovery plan, 6% of the federal government still lacks one entirely.  This week on Feds At the Edge, we explore proven strategies for building effective backup plans and provide timely advice for organizations with basic or intermediary recovery plans looking to enhance their preparedness. We’ll focus on the key pillars of disaster recovery- planning, communication, and continuous updates.   Tommy Baril, Assistant Director, Defense Capabilities and Management Team, for GAO, highlights the need for synchronized disaster recovery plans across federal agencies, stressing strategic communication and role clarit...2025-02-2057 minFeds at the EdgeFeds at the EdgeEp. 187 Using Security Intelligence to Protect Healthcare ITWhile the ability to transfer records between hospitals and other medical systems offers significant benefits, it also introduces unique challenges and risk for safeguarding Healthcare IT.  This week on Feds At the Edge, federal leaders examine three areas of concern:   >>interoperability  >>unique aspects of the attack surface  >>the impact of IoT devices.  Jennifer Franks, Director, Center for Enhanced Cybersecurity for GAO, highlights reports of rising cyber threats due to medical data interconnectivity and the need to secure legacy systems, especially since medical data remains unchanged over time.  Joe Ronz...2025-02-1258 minFeds at the EdgeFeds at the EdgeEp. 186 Improving Management of Complex Cloud EnvironmentsWhen the cloud was first introduced to the Federal Government, their implementation had a “lift and shift” approach, essentially moving servers from one location to another. But cloud technology has matured into a complex ecosystem spanning public, private, and hybrid environments – creating distinct management challenges.  This week on Feds At the Edge, federal leaders offer their suggestions on managing this ever-evolving and complex landscape, with a focus on training, understanding data and leveraging cloud functions.  Dr. Gregg Bailey, Deputy Chief Information Officer in the Office of the CIO for the US Census Bureau underscores the importance...2025-02-061h 00Feds at the EdgeFeds at the EdgeEp. 185 Dedicating Cybersecurity Resources to Critical InfrastructureProtecting operational technology (OT) environments is more complex than ever, requiring precise inventory, continuous monitoring, and strong IT-OT collaboration.  This week on Feds At the Edge, our expert panel unpacks the key cybersecurity challenges operators face in securing their OT systems.  Anthony J. DiPietro, Technical Director, Defense Critical Infrastructure Division for NSA, underscores the importance of maintaining an accurate inventory, especially in remote environments where “ghost” assets can appear unnoticed.   We’ll discuss how continuous monitoring helps mitigate these risks and why traditional IT security methods, like sandboxes and automatic updates, don’t always work...2025-01-3058 minFeds at the EdgeFeds at the EdgeEp. 184 Accelerating AI Adoption with Trusted DataHere is our final.  Playing on the drama a bit. In healthcare, every second counts, and Artificial Intelligence is transforming how data is analyzed to save lives. But when critical decisions hinge on AI, ethics, accountability, and trust become non-negotiable.  This week on Feds At the Edge, dive into the complexities for applying AI in healthcare.  Joe Ronzio, Deputy Chief Health Technology Officer for Veterans Health Administration, shares insights on the importance of rigorous human oversight, traceable training data, and recognizing bias in AI systems.   We also tackle the tough questions:  2025-01-2357 minFeds at the EdgeFeds at the EdgeEp. 183 Building a Future Ready High-Performance Government WorkforceIn an era marked by economic uncertainty, political shifts, and the rise of remote work, federal agencies face new challenges in maintaining a thriving workforce. Balancing productivity with employee well-being is no longer optional—it’s essential. This week on Feds At the Edge, we dive into how federal leaders can create scalable, personalized, and sustainable strategies to support their teams’ growth and mental health. Our guest, Matisha Montgomery, Chief Learning Officer at HUD, shares groundbreaking insights on career development. She challenges the traditional “climbing the ladder” mindset, encouraging professionals to leverage transferable skills for lateral mo...2025-01-1659 minFeds at the EdgeFeds at the EdgeEp. 182 CDM Success Stories in an Age of Cyber-attack Surface ExpansionThis week on Feds At the Edge, we dive into the evolution of the Cybersecurity and Infrastructure Agency's Continuous Diagnostics and Mitigation (CDM) program in addressing the growing cyber-attack surface.   Hemant Baidwan, CISO for DHS, OCIO, noted that Continuous Diagnostics and Mitigation is a comprehensive suite of tools and policies, with a key focus on understanding the attack surface and ensuring high data quality during deployment.  John Schneider, Senior Systems Engineer, Axonius Federal, discussed the challenges inherent in managing IoT and OT devices for federal agencies, stressing interoperability and automation as best practices.   Tune in...2025-01-0859 minFeds at the EdgeFeds at the EdgeEp. 181 Boosting Data Security and Cyber Resilience in Federal Health IT   The U.S. healthcare system, which includes roughly 200 federal hospitals, are constantly at risk for or under cyber-attack.   This week on Feds-At-The Edge we explore ways to improve security through basic controls like software updates and patching, with the conversation quickly turning to the importance of practical strategy.   >> Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface   >> Human Interaction: Learn the critical role humans play amid the new promises of AI   >> Contingency Plans: If your agency was attacked today with ranso...2025-01-021h 01Feds at the EdgeFeds at the EdgeEp. 180 Automation as a Cybersecurity Resource  Managing vast amounts of data, reducing alert fatigue, and improving threat detection can all be accomplished with automation.  This week on Feds At the Edge, we have three experts in automating cybersecurity response to provide guidance on best practices to deploy automation. They highlighted the need to establish a valid baseline for expected network behavior to identify deviations effectively, reducing false positives.   Bob Costello, CIO at CISA, stressed keeping humans involved in the process, citing a recent incident where AI breached an organization, bypassed security features by defeating automation.   Richard LaTulip, Field Chie...2024-12-1859 minFeds at the EdgeFeds at the EdgeEp. 179 How to Defend your Expanding Attack SurfaceSaaS (Software as a Service) applications, due to their ease of launch and proliferation, have created a “perfect storm” for attackers, and a significant challenge for cybersecurity professionals. Organizations with over 1,000 employees typically use 150+ SaaS applications, often unmanaged, which expands the attack surface and poses a unique threat to entities like the federal government.    This week on Feds At the Edge, we discuss where the threats may lie and give practical information on attempting to control this new threat vector.      Mark Canter, CISO at US GAO, highlights the widespread lack of understanding about where data is used, emphas...2024-12-1255 minFeds at the EdgeFeds at the EdgeEp. 178 Protecting Critical InfrastructureMalicious actors are always looking for the “Easy Button” when it comes to breaching your system.  This week on Feds At the Edge, we are revisiting our conversation on looking at the protection of Operational Technology (OT), critical hardware on premises. Traditionally separated from IT systems by air gaps, OT is now increasingly managed by IT departments due to the convergence of IT and OT.   Few realize that OT has federal compliance regulations, just like IT. The real issue, should an OT systems administrator have to do repetitive work to comply with IT mandates? Marty Edwards...2024-12-0459 minFeds at the EdgeFeds at the EdgeEp. 177 Part Two: Considering AI as a Strategic ToolThis week on Feds-At-The Edge we explore AI used as a strategic tool, focused on risk mitigation, applications, and continuous user feedback.  >> Risk Mitigation: Risks vary by application. Luke Keller, Chief Innovation Officer at US Census bureau, highlighted using NIST guidelines, including bias reduction frameworks, to ensure ethical and accurate AI deployment. High-quality, diverse datasets are essential.   >> Use Cases: Start small with proofs of concept to test limitations and risks. Ryan Simpson, Engineering Chief Technologist for the Public Sector for NVIDIA, recommended tools like Retrieval-Augmented Generation to develop use cases which work with limited data and...2024-11-2628 minFeds at the EdgeFeds at the EdgeEp. 176 Part One: Considering AI as a Strategic ToolAI is just another tool in the technology market, only becoming a powerful resource when agencies learn how to best utilize it to reach mission goals.   This week on Feds-At-The Edge we explore several insights on deploying AI effectively for the federal government landscape.   Caroline Carusone, Deputy CIO for NRC, discusses AI’s potential in identifying security risks and solving complex engineering challenges, like improving atomic reactor designs.   Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI's role in handling massive datasets, enhancing earth observation for accurate population counting, automating data...2024-11-2031 minFeds at the EdgeFeds at the EdgeEp. 175 Reprioritizing Mission Delivery and Zero Trust Security in SaaSSoftware as a Service (SaaS) is incredibly enticing with its ease and affordability, however despite the heavy lifting being done for you, the responsibility of protecting your data and network remains in your hands.   This week on Feds-At-The Edge we sit down with Eoghan Casey, VP of Cybersecurity Strategy & Product Development for Own Company, who highlights essential security practices for agencies using Software as a Service (SaaS).   >> Understanding data visibility- What's sensitive and what’s not  >> The importance of continuous monitoring and backing up your systems on a regular basis   >> Scheduling regula...2024-11-1353 minFeds at the EdgeFeds at the EdgeEp. 174 How to Succeed with Zero Trust and AI, Look to Cultural ChangeIf you’ve tuned before then you’ve heard the three magic words; People, process, technology. While technology often takes the spotlight, there’s a reason why “people” come first.   This week on Feds-At-The Edge we explore the cultural shifts agencies are prioritizing to achieve zero trust.   Jothi Dugar, CISO at NIH’s Center for Information Technology emphasizes the age-old advice, communication is key. Federal leaders should speak a language all stakeholders understand, and responsibility should be placed in the hands of the many and not the hands of the select few.  We’ll also explore t...2024-11-0758 minFeds at the EdgeFeds at the EdgeEp. 173 Using Micro segmentation to ease the Weight of ComplianceIn today’s data-driven world, network systems are under immense pressure to handle increasing loads of data while staying compliant in a rapidly evolving landscape. How can agencies effectively secure their systems when every little nook and cranny requires oversight?   This week on Feds-At-The Edge we explore how microsegmentation is emerging as a vital strategy for agencies working toward a robust zero-trust architecture.    Rob Thorne, CISO of U.S. Immigration and Customs Enforcement, highlights how complex systems often have hidden connections unknown to administrators, which micro-segmentation can reveal.  We will also dive into how ma...2024-10-3157 minFeds at the EdgeFeds at the EdgeEp. 172 DoD Embracing Continuous MonitoringThe concept of "continuous" protection, inspired by continuous software development, is gaining traction among federal tech leaders in response to rising cyber-attacks.   This week on Feds At the Edge, we sit down with subject matter experts who provide guidance for transitioning from the basic “Authority to Operate” snapshot in time to a “Continuous Authority to Operate.”   Col Bryan A Eovito, Commanding Officer, for the Marine Corps Cyber Operations Group, emphasized the value of establishing a baseline for comparison to detect discrepancies, warning that low-code/no-code solutions have vulnerabilities too.   Major Ben Hunter, Deputy Chief Inform...2024-10-2359 minFeds at the EdgeFeds at the EdgeEp. 171 Focus on Cyber Resiliency Your agency will be attacked. Even if we look at the most conservative estimates, a company like Statista shows 32,211 attacks on federal agencies in 2023. The conclusion is obvious: you will be attacked and must have a way to remediate the problem. Today, we sat down with three experienced cyber professionals to hear suggestions on improving federal cyber security resilience. Russel Marsh from the National Nuclear Security Administration observes that federal employees may work 9 am to 5 pm every day, but malicious actors do not. The best practice here is to have a checklist of what to...2024-10-1758 minFeds at the EdgeFeds at the EdgeEp. 170 Election Security: Protecting the Foundation of DemocracyThis week on Feds At the Edge, sit down with an industry expert and state election officials from Pennsylvania, Florida, and Georgia to focus on election security challenges and solutions.    Challenges:  >> Traditional threats like disinformation and denial-of-service (DoS) attacks continue to be significant. There is also a growing concern about the physical threats faced by election officials, leading to high turnover rates. In Pennsylvania, 2/3 of officials have left their positions, resulting in an influx of new, less experienced staff.  Solutions:  >> Tabletop exercises are an easy and cost-effective method to prepare for poten...2024-10-1057 minFeds at the EdgeFeds at the EdgeEp. 169 How Digital Playbooks Propel Federal ModernizationIn a world of rapid change and threat, organizations need to be ready and waiting with a plan. One good approach some are taking to navigate an ever-evolving landscape is to lean on a “digital playbook.” Customized to each situation and the unique and individual needs agencies big and small have, these playbooks could make the difference between a scramble and a smooth transition.   This week on Feds At the Edge, leaders from the Federal and commercial sectors discuss the integration of digital playbooks in federal modernization, emphasizing the blend of people, processes, and technology.  AI is...2024-10-0157 minWealthion - Be Financially ResilientWealthion - Be Financially ResilientWeekly Recap: Hidden Recession, Fed Insider Insights, Rate Cuts & MoreIn this week’s edition of Wealthion’s Weekly Market Recap, Andrew Brill highlights key insights from our expert guests:Tavi Costa discusses the Fed’s aggressive rate cuts and the mounting recession signals in the yield curve. Daniel Lacalle reveals the “hidden recession” already affecting major global economies and how dedollarization would devastate the US economy. Dennis Lockhart offers insider Fed perspectives and shares his long-term investment strategies. Plus, Brandy Maben provides essential financial planning tips to safeguard your wealth in uncertain times.Investment Concerns? Get a free portfolio review with Wealthion’...2024-09-2854 minFeds at the EdgeFeds at the EdgeEp. 168 Metrics that Matter for Critical Infrastructure Cyber ResilienceThe 2021 Colonial Pipeline incident has stood in history as a prime example of the importance of cyber resilience for critical infrastructure. This week on Feds At the Edge, we delve into the call-to-action events like this have created for agencies everywhere and the resources available for even the smallest entities.    Cheri Caddy, Senior Technical Advisor for Cybersecurity at the US Department of Energy, talks about resources like CISA & NIST, but suggests that private companies should also build ties with local FBI offices.    Brendan Peter, VP, Global Government Affairs of SecurityScorecard, notes the importance of continuous risk...2024-09-2459 minFeds at the EdgeFeds at the EdgeEp. 167 Making Progress in the Incident Response and ReportingWhen a network is attacked, analysts return to the logs to gain an understanding of where the point of vulnerability was, which makes keeping these records a crucial tool in cyber resilience.   However, a lack of staff, poor existing systems, and limitations on information sharing in our increasingly complex and hybrid landscape could prevent agencies from keeping their records reliable and up-to-date.   This week on Feds At the Edge, leaders from the Federal and commercial sectors share they ways they’ve been able to overcome the hurdles they face when logging events. Tate Jerus...2024-09-1954 minFeds at the EdgeFeds at the EdgeEp. 166 Mobile Security - a Requirement for National SecurityWith an accelerated leap in our post-COVID world, mobile devices such as cell phones have become a crucial part of the landscape for remote workers and in turn have also become a key component of today’s attack surface.  This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.   Tune in o...2024-09-1157 minFeds at the EdgeFeds at the EdgeEp. 165 Cloud Architecture Matters: Improve Cloud Security by Writing Natively to the CloudThe transition to cloud computing by federal agencies has highlighted the importance of security, especially as sensitive federal assets are now in hybrid environments.   This week on Feds At the Edge, leaders from federal and commercial sectors focus on improving security within the complex cloud environment. When code is written with the cloud in mind, applications can be moved easily, updates can be mastered, and systems architects can leverage many aspects of the cloud that are missed with an old “lift and shift” approach.   Dave Hinchman, Director, Information Technology and Cybersecurity for US GAO, coined an aph...2024-09-051h 02Feds at the EdgeFeds at the EdgeEp. 164 Election Security: Protecting the Foundation of Democracy – AI can Boost Election Integrity, if Done CorrectlyIn this week’s episode of Fed’s At the Edge, we are talking about US Elections. From observations about challenges seen in previous elections to best practices to ensure a safe and fair election process.   We’ll explore sources of help for election officials like utilizing CISA, local associations, and the US Election Assistance Commission. We also touch on critical areas like cybersecurity, communications, and physical security.   Mark Earley, Supervisor of Elections for Leon County, FL, shares how election professionals should be aware of phishing vulnerabilities as they honor the responsibility of answering citizens emails  2024-08-2858 minFeds at the EdgeFeds at the EdgeEp. 163 Zero-Day Chronicles: Lessons from the Front LinePeople imagine large organizations such as the Department of Transportation when they think about who needs to utilize Zero Trust. What they don’t realize is that a smaller entity can make for a profitable attack, even a gateway to those larger targets.   In this week's Feds At The Edge podcast, Nick Graham, Senior Technical Sales Engineer of Civilian Sales from Raven Tek offers some solutions that smaller institutions should prioritize in their transition to a safer cybersecurity posture.  >> Multifactor Authentication – How this framework for larger organizations can move to eliminate many security problems  >> S...2024-08-1917 minFeds at the EdgeFeds at the EdgeEp. 162 Zero Trust: Protecting both Data and IdentityWhen the federal government adopts Zero Trust principles, it must consider both user identity and the data being accessed.  This week on Feds At the Edge, leaders from federal and commercial sectors stress the importance of centralized coordination, automated labeling, and real-time access control through Identity Management.   Bryan Rosensteel, US Federal CTO for Ping, advocates for a "federated" identity management system, as individual agencies may struggle to meet Zero Trust demands in a timely manner.   Tune in on your favorite podcasting platform as participants also discuss the merits of access-based and role-based controls, sug...2024-08-1559 minFeds at the EdgeFeds at the EdgeEp. 161 Unlocking Your Agency’s Data Treasure Trove with Large Language ModelsIn this week’s episode of Fed’s At the Edge, we talk with agency and industry experts about the potential of Large Language Models (LLMs) in government, where improved knowledge management and a reduction on tedious tasks are just some of the benefits waiting to be unlocked.   We’ll explore the large Knowledge Management Platform CMS has put together to assist federal professionals access information.  We’ll look at how AI and LLMs should be viewed as an extension of human abilities and how organizations may have to ethically organize new policies on using AI to deri...2024-08-0856 minFeds at the EdgeFeds at the EdgeEp. 160 Protecting the 2024 Elections: Be Prepared for AnythingDisputes over the 2020 presidential election have persisted for four years.   This week on Feds At the Edge, we discuss best practices to ensure the 2024 election's safety and accuracy with a focus on the need for robust cybersecurity measures, having a strategy to respond to cyber threats and the need to have strong partnerships with the private sector.  Lester Godsey, CISO, Enterprise Technology for Maricopa County, Pheonix AZ, highlights the influence of social media on election integrity, suggesting that false information can impact the voter’s predisposition to vote.   Jim Richberg, Head of Cyber Policy an...2024-08-0155 minFeds at the EdgeFeds at the EdgeEp. 159 Overcoming Legacy Infrastructure Through Digital TransformationTo achieve a successful digital transformation in your organization, it’s essential to consider the users.  This week on Feds At the Edge, we have gathered leading experts from City of Brownsville, TX, Delaware Department of Technology and Information, California Department of Technology, City of Roseville, CA, and Equinix who share valuable insights into making meaningful changes in their respective organizations.  Focus on User Experience: when you prioritize user experience, you make them feel included and they become more willing to transition.   Effective Communication: clearly communicating with staff about the project’s vision and each person’s responsibilit...2024-07-2500 minFeds at the EdgeFeds at the EdgeEp. 158 Data and AI Top Trends Shaping Government in 2024  Chat GPT has made AI a household term, citizens can quickly gather useful data such as where the best places to travel through Italy are. But how are agencies using artificial intelligence technologies when it comes to larger and more serious topics, such as nuclear weapon distribution?  This week on Feds At the Edge, we have gathered leading experts from the FDA, National Cancer Institute and ICE who share their thoughts as agencies focus on data integrity, evolution of AI and the importance of training.  >> Utilizing use cases, particularly when you are gathering data information suc...2024-07-1757 minFeds at the EdgeFeds at the EdgeEp. 157 Zero Trust Needed to Win the Cyber WarZero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge, we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “zero trust model.”  We delve into this stricter cybersecurity program where identity leads in the guideposts in defending today’s cyber landscape.  Dr. Robert Roser, CISO with the Idaho National Laboratory agrees, “Without identity, nothing else matters.”     We also discuss the larger-than-life landscape that agencies are tasked with protecting. Sean Connelly, Federal Zero Trust Architect with CISA reminds listen...2024-07-101h 07Feds at the EdgeFeds at the EdgeEp. 156 How state and local governments can secure unstructured data.Follow FedInsider on LinkedIn This week on Feds At the Edge, we talk about the ways state and local organizations can secure unstructured data.   Jimmy Rogers, Director of Information Technology for the Colorado Dept of Higher Education, shares that up to 90% of the data he sees is unstructured, and knowing how to manage this data is key to keeping it secure.  Terri Bettinger, Deputy Director, CIO of Ohio Dept of Aging, suggests assigning responsibility for data to specific individuals fosters accountability and ensures data is stored securely.  Todd Haller, Reginal Director, Uns...2024-07-0359 minFeds at the EdgeFeds at the EdgeEp. 155 Protecting Critical Infrastructure Requires Robust Partnerships.For the video of this podcast:  Protecting Critical Infrastructure Requires Robust Partnerships. Follow FedInsider on LinkedIn  Malicious actors are always looking for the “Easy Button” when it comes to breaching your system.    This week on Feds At the Edge, we are looking at the protection of Operational Technology (OT), critical hardware on premises. Traditionally separated from IT systems by air gaps, OT is now increasingly managed by IT departments due to the convergence of IT and OT.   Few realize that OT has federal compliance regulations, just like IT. The r...2024-06-2559 minFeds at the EdgeFeds at the EdgeEp. 154 Boosting Cybersecurity Power for State, Local Government & EducationFor the video of this podcast: Boosting Cybersecurity Power for State, Local Government and Education.  Follow FedInsider on LinkedIn In professional baseball, winning championships does not depend on having a large budget. Like talented members of a pro-league team, there are some government agencies that just seem to “get it” when it comes to cybersecurity, despite being straddled with limited funding. This week on Feds At the Edge, we’ve got an all-star lineup, including James Weaver, Secretary and State Chief Information Officer from the North Carolina Department of Information Technology will lead the way...2024-06-1858 minFeds at the EdgeFeds at the EdgeEp. 153 After an Attack: Cyber Recovery Best Practices for State and Local GovernmentFor the video of this podcast: After an Attack: Cyber Recovery Best Practices for State & Local Agencies. Follow FedInsider on LinkedIn Mike Tyson’s famous quote, “Everyone has a plan until they get punched in the face,” is a fitting analogy for the unpredictability and impact of a cyber-attack. In this week’s Feds At The Edge podcast, we have a brutally honest conversation about a topic nobody wants to address: the step-by-step process of recovery from a cyber-attack. We explore the importance of isolating the hypervisor to establish secure virtual domains...2024-06-1158 minFeds at the EdgeFeds at the EdgeEp. 152 How to Fight Threats to the Software Supply ChainFor the video of this podcast: How to Fight Threats to the Software Supply Chain   Follow Fedinsider on LinkedIn  The federal government is playing a game of cyber-attack-a-mole with bad actors, constantly adapting to their threats but ultimately driving them to other areas, such as targeting endpoints or applications to find a weak point not being monitored. This week on Feds At the Edge, we are focusing on sophisticated attacks on federal applications and APIs. Jerry Cochran, Deputy Chief Information Officer and Director of the Cybersecurity & DigitalOps Division from Pacific Northwest Na...2024-06-031h 00Feds at the EdgeFeds at the EdgeEp. 151 Using Data to Fortify Network DefenseFor the video of this podcast: Using Data to Fortify Network Defense  Follow FedInsider on LinkedIn Years ago, anti-virus software updates were distributed via floppy disks through the U.S. Mail. Today, due to the vast and complex nature of cyber threats, continuous diagnosis and mitigation (CDM) is necessary. This week on Feds At the Edge, we explore how to deploy CDM solutions for federal agencies, starting with best practices and guidance for the transition. Andrew Manos, Director, Commercial Services for True Zero Technologies, suggests that, given today’s data volume, cen...2024-05-2954 minFeds at the EdgeFeds at the EdgeEp. 150 Hard Truths of Data Security in the Public SectorFor the video of this podcast: Hard Truths of Data Security in the Public Sector  Follow FedInsider on LinkedIn  Having a completed checklist can give agencies a sense of security, but with today’s explosion of data and potential attack from an unexpected vector, have they been falsely “lulled into complacency?” This week on Feds At the Edge, we sit down with Travis Rosiek, Chief Technology officer with Rubrik to discuss the importance of strategic protection, especially during vulnerable times like employee departures and holidays. And avoiding data hoarding to prevent hidden attack codes.2024-05-2256 minFeds at the EdgeFeds at the EdgeEp. 149 How Agencies can Adopt AI Swiftly and SecurelyFor the video of this podcast: How Agencies Can Adopt AI Swiftly & Securely Follow FedInsider on LinkedIn  Artificial Intelligence saves consumers and businesses time and resources by instantly producing content and images. But where does it fit in helping agencies serve the mission? Karen Hay, Digital Health Transformation Lead for the Global Public Sector with Salesforce sums it up perfectly, “Generative AI can unlock the knowledge trapped in data.” This week on Feds At the Edge, we explore how this innovative technology can revolutionize the way our government runs. A gui...2024-05-1659 minFeds at the EdgeFeds at the EdgeEp. 148 AI Can Set a New Standard for Customer Service.Follow FedInsider on LinkedIn  While always looking for ways to stay connected with the citizens they serve, Government institutions continually face the challenge of improving citizen services while they remain understaffed and underfunded. This week on Feds At the Edge, we pose the question; Can modern technology like AI be successfully implemented within an agency’s allotted budget and set a new standard for citizen service? Amanda Nabours, IT Architect of the Emerging Technology Advisory Panel with Dallas, Texas believes the answer begins with data and ends with workforce training. Agencies must prevent bia...2024-05-0855 minFeds at the EdgeFeds at the EdgeEp. 147 Challenges of Continuous Compliance with a Remote WorkforceFor the video of this podcast: Challenges of Continuous Compliance with a Remote Workforce Follow FedInsider on LinkedIn  Compliance is difficult enough in an air-conditioned data center, so for those out on the edge with spotty communication and potential bullets flying around, it could be near impossible. Despite this disruption, newly coined Denied Disconnected Latent, or DDL, when communications are restored, compliance still must be maintained. This week on Feds At the Edge, we offer some perspectives on how to manage this arduous task. We’ll explore how the developers who deploy the app...2024-05-021h 00Feds at the EdgeFeds at the EdgeEp. 146 The cyber wild west is still wildFor the video of this podcast: The Cyber Wild West is Still Wild Follow FedInsider on LinkedIn  When the United States expanded westward, citizens found that surprise could lurk around any corner, earning the nickname “the wild west.” Today, with unlimited storage, fast speeds, and artificial intelligence, our technical landscape can and should be considered just as wild. This week on Feds At the Edge, we’ve gathered federal experts who corral malicious code and prevent bad actors from robbing you blind. Marisol Cruz Cain, Director of Information and Cybersecurity Team fo...2024-04-2559 minFeds at the EdgeFeds at the EdgeEp. 145 Breaking the System into Tiny Little Pieces: a DoD approach to Zero Trust and micro segmentation.For the video of this podcast: Breaking the System into Tiny Little Pieces: a DoD approach to Zero Trust and micro segmentation. Follow FedInsider on LinkedIn  Four years ago, conversations among thought leaders focused on getting over the hurdle of defining Zero Trust Architecture so both private and public sector organizations could recognize and enjoy its benefits. Today, we move to the “hows” of implementation, and turn focus to micro-segmentation. This week on Feds At the Edge, we are breaking the system into tiny little pieces. Angelica Phaneuf, CISO with US Army...2024-04-171h 01Feds at the EdgeFeds at the EdgeEp. 144 Unlocking Modernization with AI Management: Meeting the Mission Imperative  For the video of this podcast: Unlocking Modernization with AI Management: Meeting the Mission Imperative Follow FedInsider on LinkedIn  Unlocking Modernization with AI Management: Meeting the Mission Imperative (E144) While AI is not the panacea to solve all federal technology problems, it does hold promise to be an assist to federal agencies. Cautiously, agencies are exploring how AI can help meet their missions. In this week’s Feds At the Edge, agency and industry thought leaders share their thoughts on two of the biggest issues agencies face while implementing AI: 2024-04-1056 minFeds at the EdgeFeds at the EdgeEp. 143 Generative AI in GovernmentFor the video of this podcast: Generative AI in Government Follow FedInsider on LinkedIn  With the release of Chat GPT, there was an explosion of people lauding the benefit of vacuuming up previous knowledge and presenting it in many formats at the touch of a button. As technology evolved, headlines everywhere sang the praises of possibilities with Generative AI, but serious glitches such as producing narratives with factual inaccuracies make for troubling results. This week on Feds At the Edge, we showcase some successes Federal agencies have had with Generative AI, but a...2024-04-0459 minFeds at the EdgeFeds at the EdgeEp. 142 Facing the Challenges AI PosesFor the video of this podcast: Facing the Challenges AI Poses Follow FedInsider on LinkedIn  The artificial intelligence landscape is rapidly changing, and we pose the question- can agencies keep up? With programs like ChatGPT, portrayed as the answer to every conceivable problem for the beleaguered federal technology professional, this week on Feds At the Edge, we delve into how agencies can leverage these advancements while managing the risks associated with them Mangala Kuppa, CTO & Responsible AI Officer for the Department of Labor, highlights the importance for tailored approaches, warning against a...2024-03-261h 00Feds at the EdgeFeds at the EdgeEp 141 Tapping into the Strategic Power of DataFor the video of this podcast: Tapping into the Strategic Power of Data  Follow FedInsider on LinkedIn Years ago, Federal leaders would dream of getting terabytes of data; few thought we would have more computing power than trusted information. This week on Feds At the Edge, our discussion focuses on some of the risks in storing, sharing, and analyzing that data. We tackle on the questions now being asked: How is data collected, and what method is used to collect it? What impact does generated data have? 2024-03-2058 minFeds at the EdgeFeds at the EdgeEp. 140 Letting in the Good Ones, keeping the Bad Ones out: Managing Access for Zero TrustFor the video of this podcast: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust Follow FedInsider on LinkedIn  In the realm of cybersecurity, Multifactor Authentication (MFA) has long been seen as a safeguard against cyber threats, but malicious actors are adapting to every blockade put in their path. Research has revealed that even when performing flawlessly, MFA can still leave opportunities for attackers. This week on Feds At the Edge we take a look at current threats and best practices for reducing the attack surface for f...2024-03-141h 03Feds at the EdgeFeds at the EdgeEp. 139 Data and AI are Driving HR ModernizationFor the video of this podcast: Data & AI are Driving HR Modernization Follow FedInsider on LinkedIn  Mountains of data and Artificial intelligence are impacting every aspect of all federal agencies. This week on Feds At the Edge we examine the impact of technology innovation on modernization of human resources. Jason Nelson, Human Capital Assistant Administrator/CHCO for TSA opens the discussion with a sobering fact: With an average of 260 workdays a year, the TSA is faced with processing 770 job applications every single day to keep up with the 200,000 they receive annually. T...2024-03-0758 minFeds at the EdgeFeds at the EdgeEp. 138 Barbarians at the Gate: Zero Trust, Active Directory, and what you need to knowFor the video of this podcast: Barbarians at the Gate: Zero Trust, Active Directory, & What You Need to Know Follow FedInsider on LinkedIn  Our panel this week focuses on Microsoft’s Active Directory and Identity Management. What’s their executive summary? The Barbarians Chris Roberts, Director of Federal Sales Engineering with Quest Public Sector reveals a staggering 94 million daily attacks on Microsoft’s Active Directory, which is popular in both commercial and federal markets. We ask the question, when it comes to implementing zero trust, is multi-factor authentication enough? Discover the wea...2024-03-0158 minFeds at the EdgeFeds at the EdgeEp. 137 Who are you – and can you prove it? Identity and Access ManagementFor the video of this podcast: Building a Better Case Management System Follow FedInsider on LinkedIn  Over the years, federal systems have taken on a Rube Goldberg approach, customized by humans who may think radically differently from each other, to respond to a specific kind of workflow inherent in an individual case. After decades of this, you get systems that are siloed with unique methods of doing the same activity. In this week’s episode of Feds at the Edge, we will look at a new way to streamline the entire case management pro...2024-02-2259 minFeds at the EdgeFeds at the EdgeEp. 136 Building a Better Case Management SystemFor the video of this podcast: Building a Better Case Management System  Follow FedInsider on LinkedIn  Over the years, federal systems have taken on a Rube Goldberg approach, customized by humans who may think radically differently from each other, to respond to a specific kind of workflow inherent in an individual case. After decades of this, you get systems that are siloed with unique methods of doing the same activity. In this week’s episode of Feds at the Edge, we will look at a new way to streamline the entire case management proc...2024-02-1559 minFeds at the EdgeFeds at the EdgeEp. 135 An Update on Improvements to CISA’s Zero Trust Model (E135 Encore)  For the video of this podcast:  An Update on Improvements to CISA’s Zero Trust Model (E135 Encore) Follow FedInsider on LinkedIn  When you walk down the grocery store aisle you are bombarded with “New and Improved.” The Cybersecurity and Infrastructure Security Agency is not selling soap, but they are in the business of improving their original model as much as any Proctor and Gamble product. In this week’s episode of Feds At the Edge, top technology leaders review the Zero Trust Maturity Model Version 2.0. They take you through the new attention on importan...2024-02-0858 minFeds at the EdgeFeds at the EdgeEp. 134 The Urgency of API SecurityFor the video of this podcast: The Urgency of API Security  Follow FedInsider on LinkedIn  Did you know that 80% of attacks companies like Akamai Technologies are seeing involve API? What’s an API? What once was a quick way to integrate systems but minimally used, now has exploded onto federal networks by the thousands thanks to the popularity of cloud use. Why worry? APIs are small and embedded and could be as minimal as a single line of code. However, their impact is powerful, and a weak point can have...2024-01-301h 22Feds at the EdgeFeds at the EdgeEp. 133 How to Increase Government IT AgilityFor the video of this podcast: How to Increase Government IT Agility  Follow FedInsider on LinkedIn  Large organizations, whether public or private, all have challenges in making the digital transformation. Today, we sit down with public and private sector leaders who have had success in managing to make large, state-based systems adapt to today’s world of rapid change. Ajay Gupta, Chief Digital Transformation Officer for California’s DMV shares his thoughts on the benefits to customizable options, commonly called “low code, no code” and how being sensitive to legacy systems is key for organi...2024-01-2355 minFeds at the EdgeFeds at the EdgeEp. 132 Bringing Agility to the Modern Security Operations CenterFor the video of this podcast: Bringing Agility to the Modern Security Operations Center  Follow FedInsider on LinkedIn Originally designed to thwart minor malicious codes, Security Operations Centers (SOC’s) have evolved over the last 50 years what they are today; centers that provide 24 hour protection, 365 days of the year to for key government organizations. Even so, the profusion of threat vectors prove to be a challenge and many SOC’s will need to upgrade in order to keep up with the current threat landscape. In this week’s episode of Feds At the Edge, w...2024-01-1259 minFeds at the EdgeFeds at the EdgeEp. 131 An Update on Improvements to CISA's Zero Trust ModelFor the video of this podcast: An Update on Improvements to CISA’s Zero Trust Model Follow FedInsider on LinkedIn When you walk down the grocery store aisle you are bombarded with “New and Improved.” The Cybersecurity and Infrastructure Security Agency is not selling soap, but they are in the business of improving their original model as much as any Proctor and Gamble product. In this week’s episode of Feds At the Edge, top technology leaders review the Zero Trust Maturity Model Version 2.0. They take you through the new attention on importance of ident...2023-12-2158 minFeds at the EdgeFeds at the EdgeEp. 130 Budgeting Priorities for Federal Deployment of Zero TrustFor the video of this podcast: Budgeting Priorities for Federal Deployment of Zero Trust  Follow Fedinsider on LinkedIn Agencies have matured in their understanding of zero trust. No longer trying to define what it is, focus is now on the affordability within already challenged budgets. In the latest episode of Fed’s At the Edge, we sit down with Brian Dennis, Principal Technologist of the Public Sector for Akamai Technologies. An expert in the deployment of zero trust, Brian will give listeners an overview of the most economical ways agencies can move forward wit...2023-12-1933 minFeds at the EdgeFeds at the EdgeEp. 129 Going all out on Securing Public DataFor the video of this podcast: Going all out on securing public data Follow Fedinsider on LinkedIn With data generation being on the ever-constant increase, new solutions to protect it are needed to keep up with the challenge. In this week’s episode of Fed At the Edge, we sit down with a veteran in data protection, Aaron Lewis – Head of Public Sector Sales, Engineering for Rubrik. He shares with listeners lessons learned from decades of his involvement in data protection. He focuses on three ideas that involve data: Classification – Why is...2023-12-0756 minFeds at the EdgeFeds at the EdgeEp. 128 AI Revolution in Government: How it's Changing the LandscapeFor the video of this podcast: AI Revolution in Government: How it’s Changing the Landscape  Follow Fedinsider on LinkedIn With millions employed by the federal government, and the wide range of activities they are responsible for each day, how do we begin to make a technology like AI live up to its own billing and implement it in a way that makes the workforce more efficient? In this week’s episode of Feds At the Edge, we’ve gathered agency and commercial thought leaders who share how their agencies will apply AI to meet...2023-11-221h 23Feds at the EdgeFeds at the EdgeEp. 127 Learning from Log4j: How to Keep Government Applications Secure Follow Fedinsider on LinkedIn More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors — who with a little compromised code began opening extremely hard to find doors to sensitive data. In this week’s episode of Feds At the Edge, we’ve gathered thought leaders who share how in the wake of a large-scale attack in 2021, they structured a response through prioritizing, patching and preauthorization efforts. What do they think should be in your de...2023-11-151h 27Feds at the EdgeFeds at the EdgeEp. 126 Federal Support for CybersecurityFollow Fedinsider on LinkedIn If we were to modernize the once popular “word cloud,” we would see phrases like “hybrid cloud,” and “zero trust,” always paired with terms like “unfunded mandate.” Thanks to the Infrastructure Act of 2022 that brought $1.9 billion in funds appropriated for cybersecurity, those word clouds are finally breaking up. This week on Feds At the Edge, we’re finishing up our conversation on combating cyber-crime by examining how agencies are optimizing the use of these funds, so state and local governments can solve today’s threat and be prepared for what’s next in the years to c...2023-11-0831 minFeds at the EdgeFeds at the EdgeEp. 125 Combatting Cyber Crime in State & Local GovernmentFollow Fedinsider on LinkedIn In the first of a two part special of Feds At the Edge, we took the conversation to Austin, Texas where we gathered top thought leaders to explore how their local organizations are combatting cyber threats in a post COVID world. This week we’re diving right in with data, more specifically the expanded cyber landscape full of personal data malicious actors gained easier access to as the workforce transitioned into remote working. We look at how Application Program Interfaces (APIs) can act as a gateway and attack point fo...2023-11-0230 minFeds at the EdgeFeds at the EdgeEp. 124 Zero Trust: The Importance of Standardization & ConsistencyFollow Fedinsider on LinkedIn Napoleon Hill once said that a goal is a dream with a deadline. In this week’s episode of Feds At The Edge, we’ve gathered leading experts who share how their organizations are turning the once-upon-a-dream idea of zero trust architecture into an accomplished goal by the end of 2024. Leaders from DHS, CISA, USPS, SailPoint, BeyondTrust and Ping Identity explore ideals behind Identity Credentials and Access Management (ICAM). Avoiding the trap of “shiny new things” Moving beyond meeting bare minimum compliance requirements to check a box Th...2023-10-2559 minFeds at the EdgeFeds at the EdgeEp. 123 Strengthening Your Network Security: Balancing Outer & Inner DefensesFollow Fedinsider on LinkedIn In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. Today, however, we also must consider the value of applying this strategy to applications as well. In this week’s episode of Feds At the Edge, we’ll dive into why we need both approaches to have a secure Federal System. We’ll also explore the changing landscape as the days of having servers just down the hall has given way to public...2023-10-2058 minFeds at the EdgeFeds at the EdgeEp. 122 State & Local: Using AI & Machine Learning to Improve ServicesFollow Fedinsider on LinkedIn Everyone who has driven through Missouri knows that they state motto is “Show Me.” In this week’s episode, we’ll explore the hype around artificial intelligence and with everything we’ve heard, it’s time to show us. We’ve gathered a fantastic panel of State, local and industry leaders who will share with us how artificial intelligence is being used to reduce costs & improve services at the local level, across the nation. Train users now to use AI tools to their benefit, and not to fear progress. Using AI to detect a...2023-10-161h 26Feds at the EdgeFeds at the EdgeEp. 121 The Human Side of Zero TrustFollow Fedinsider on LinkedIn In this week’s episode we are exploring the remarkable progress both the private and public sector has made in their move to Zero Trust and the value of the human aspect when it comes to strategy, design and leveraging guidance from the federal government. Wayne Rodgers, Zero Trust Lead from the Department of Education reminds listeners one can’t throw a switch and have zero trust just emerge from the bits and bytes. He highlights how test programs can and should be part of the journey and why your agency shou...2023-10-0457 minFeds at the EdgeFeds at the EdgeEp. 120 The AI Big Bang: Exploring Government’s Growing Universe of AI ApplicationsFollow Fedinsider on LinkedIn Most people today equivalate the sum of Artificial Intelligence to one thing; ChatGPT. In this week’s episode of Feds At the Edge, we’ll bust the myth by sharing how Federal leaders are making data-driven decisions leveraging advancements in technology with a wide range of AI. We dive into the five concepts you may never have thought of but should be top of mind: Clean Data. What happens when second or thirdhand data leaves you with a challenging clean up? Privacy and Security. Is your agency keep...2023-09-261h 27Feds at the EdgeFeds at the EdgeEp. 119 Threat Intelligence Sharing in a Complex Threat LandscapeOne of the challenges of raising a child is teaching them how to share; one of the challenges of federal information technology professionals is teaching them to share. Today we take a look at organizations that encounter cyber threats and their efforts at sharing threat information. Sharing cyber threat information isn’t a recent idea -- Executive Orders have encouraged sharing for years. February 13, 2015, talks about the goal of creating robust information sharing related to cybersecurity risks and incidents. May 12, 2021 “Removing barriers to threat sharing” that encourages the sharing of information across...2023-09-1228 minFeds at the EdgeFeds at the EdgeEp. 118 Cybersecurity: Protect & Personalize User ExperienceExecuting the mission, abstracting complexity, driving for speed The Biden administration didn’t just release Executive Order 14-058 to make federal websites look good, the practical aspect of user experience is making sure citizens can access information in a speedy, and safe manner.  Conrad Bovell from HHS makes a strong statement when he states the reason for cybersecurity is to secure the mission of the agency.  For his agency, it is quite a large mission. During the interview, he casually mentions that HHS has a #1.68 trillion annual budget.  The obvious method is to...2023-09-0629 minFeds at the EdgeFeds at the EdgeEp. 117 Zero Trust Security Transformation: A “How To” GuideCompliance, maturity levels, edge computing Some people think the television phrase, “Set it and forget it” applies to Zero Trust. Today’s discussion throws that notion out the window. The interview takes a deep dive into how an agency can move to a Zero Trust Architecture.  Three experts discuss compliance, maturity levels, and the role of edge computing. The conclusion is obvious: Zero Trust is a serious, constantly evolving methodology and federal leaders must take advantage of every resource possible to gain a thorough understanding of the process. Jennifer Franks from the GAO points...2023-08-2932 minFeds at the EdgeFeds at the EdgeEp. 116 Cybersecurity in a Post-Pandemic WorldTechnology maturing, constant attacks, automated responses For the last ten years, everybody in federal software has been discussing the maturity model. We all know that a system must start, be managed, and be optimized.  Unfortunately, only recently have advances in hardware and software allowed this process to take place.  Today, we listen to a conversation between a federal technology expert and a commercial subject matter expert with a focus on cybersecurity in a post-pandemic era.  Covid kickstarted the ability for federal leaders to be able to be transparent and to collaborate securely.  Perhaps this is a st...2023-08-2433 minFeds at the EdgeFeds at the EdgeEp. 115 Innovation in Federal Networks: What's Now, What's NextNetwork visibility, remote access, leveraging artificial intelligence.   Predictions are almost impossible in the rapidly changing world of military communications.  Despite that, our tech leaders will offer ideas on visibility, a uniform defense network, and eliminating lateral movement in these networks. If you look at the past twenty years, an argument can be made that the DoD has responded quickly to attacks; however, the solution really hasn’t had resilience or redundancy in mind.  Today’s interview gives three ways the DoD is accomplishing the task of remediating some of these issues.  The experts discuss software defined...2023-08-151h 01Feds at the EdgeFeds at the EdgeEp. 114 Pathway to Zero Trust Part 2 of 3Trusting your network, sharing information, leveraging new tools. The DoD has targeted 2027 as the date to make the transition to Zero Trust. The initiative includes 91 activities and 7 pillars; additionally, it wants the result to be flexible beyond 2027.  This is an interview that includes a Major from the Army and a commercial subject matter expert who look at challenges and solutions to achieving that goal. The discussion focuses on three areas: role of constant communications, inter service communication, and the concept of fabric at the edge for improved communications.  During the discussion, Major Cory Do...2023-08-0827 minFeds at the EdgeFeds at the EdgeEp. 113 CyberThreats 2023: DoD & Civilian Agencies Working to Adapt Part 1 of 3Maintaing operations while under attack Today we have the first part of a three-part series with a focus on Cyber Threats 2023 in the DoD. This initial interview looks at high level considerations: cloud, identity management, and maintaining a secure network while undergoing improvement. An argument can be made that in the past 20 years the DoD has responded to attacks in a siloed manner. In other words, they may have gotten a solution that worked, but it may not have interoperated with other aspects of the DoD. Today’s threats are so overwhelming that fo...2023-08-0145 minFeds at the EdgeFeds at the EdgeEp. 112 The Amazing Story of a Federal Effort to Find, Grow & Develop Tech TalentWhen you hear of scouts giving scholarships, you think of the University of Alabama discovering a defensive lineman in rural Georgia.  This is a story of the long-term result of the federal government discovering and developing talent. This effort had a tremendous long-term impact on improving cybersecurity in the government and commercial sector as well. Today we have Travis Ross, the new CTO Federal for Rubrik. During the interview, you will learn about his fascinating career. Somewhat of a “Doogie Howser,” Travis was spotted early in his schooling to be a whiz at solving puzzles. 2023-07-2635 minFeds at the EdgeFeds at the EdgeEp. 111 Tackling the Challenge of Operational Technology Security= = = = What happens if a patch means replacing a $500,000 piece of equipment?   Malicious actors are equal-opportunity attackers. Of course, they will go after federal agencies in the cloud; they will also attempt to penetrate systems through good old-fashioned industrial equipment, assets, and processes – what has gotten the label “Operational Technology.”   We take it for granted that when an exploit is discovered we can patch our systems, whether in the cloud or on-premises. There is a much different story when we switch from patching Information Technology to Operational Technology.   T...2023-07-1855 minFeds at the EdgeFeds at the EdgeEp. 110 DoD’s Roadmap for Zero Trust Strategy “We already have Zero Trust,” what to do when broke, and Beyond Thunderdome Today, we look at how the DoD is implementing Zero Trust Architecture.  We will see some areas that deployed ZTA before it was mandated; some teams that couldn’t afford ZTA, and finally, a look at something called Thunderdome that may allow the department to reduce the adoption time from five years to one year. Rick Simon is the cyber portfolio manager at the Defense Innovation Unit in Mountain View, California. Their mission is to reach out to commercial organizations and seek innovati...2023-07-121h 27Feds at the EdgeFeds at the EdgeEp. 109 The Changing Landscape of Identity SecurityIn January of 2021, Executive Order 13985 titled Advancing Racial Equity and Support for Underserved Communities Through the Federal Government was released. Today’s discussion shows how agencies are responding to that mandate around identity management. It would seem there should not be a problem. The goal here is to make sure everyone has access to benefits, loans, and even FEMA support. In an ideal world, a citizen accesses a federal website, gets identified, and continues through the process. However, we have people get frustrated with the digital process of identification to the point where they abandon their requests....2023-07-0559 minCarahCast: Podcasts on Technology in the Public SectorCarahCast: Podcasts on Technology in the Public SectorChief Data Officers Digital Roundtable: The AI Era In GovernmentCarahsoft and FedInsider partnered to bring together a panel of Chief Data Officers and industry leaders for a dynamic discussion around the evolving challenges surrounding Data as a Strategic Asset. Our CDO Panel discussed the burgeoning use of artificial intelligence (AI) and how it is spurring invention and innovation across many sectors, including:Science, where AI is accelerating discovery;Education and the development of individualized curriculumSpace through autonomous spacecraft and smart habitatsHealthcare using sensors and smart micro-systemsSmart Cities to reduce cost, enhance safety, and ensure environmental standardsMilitary, intelligence and government through a wide variety of applications 2021-06-041h 24CarahCast: Podcasts on Technology in the Public SectorCarahCast: Podcasts on Technology in the Public SectorLegacy Modernization with FedInsider’s Industry PanelListen as industry leaders share their insights and strategies for increasing the accessibility and functionality of the digital government.2021-05-2154 minCarahCast: Podcasts on Technology in the Public SectorCarahCast: Podcasts on Technology in the Public SectorLegacy Modernization with FedInsider’s Government PanelListen to this examination of the strategies governments and technology companies are using to modernize technology to increase the accessibility and functionality of digital citizen services.2021-05-2154 minCarahCast: Podcasts on Technology in the Public SectorCarahCast: Podcasts on Technology in the Public SectorElection Security: 2020 and Beyond with FedInsiderElection officials throughout the country, armed with cyber-trooper support from Washington, went on the offensive this year and staved off significant cyber penetration of the election process.2021-01-221h 21