Analysis

  • How do you delivery healthcare anywhere at anytime? What are the strategic priorities for the military health system? How has MHS sought to address some of the critical challenges it faces? Join host Michael Keegan as he explores these questions and more with Dr. Karen Guice, Acting Assistant Secretary of Defense for Health Affairs within the U.S. Department of Defense.

    December 19, 2016
  • From Shaun's perspective, if an agency has just discovered a zero-day threat it is about a day too late. Policies should be in place that can immediately respond to threats. Shaun also addressed budgeting and suggested that perhaps the constant refrain of increasing resources should be balanced with leveraging existing investments. Many agencies may feel secure if they comply with all the rules and regulations from security agencies, but the truth is that compliance may not be enough to prevent attacks.

    December 16, 2016
  • What is the Precision Medicine Initiative (PMI) Cohort Program? How do you balance accessibility and data security of cohort participants? How do you manage expectations? Join host Michael Keegan as he explores these questions and more with Eric Dishman, Director, Precision Medicine Initiative (PMI) Cohort Program, National Institutes of Health.

    December 12, 2016
  • Tim Ruland’s background gives him a practical edge to the cybersecurity threat intelligence discussion. During the interview, he talked about the practical aspects of gaining a better understanding of cybersecurity threat intelligence. It's important to set priorities, which is commonly referred to as "orchestration." Terrific in theory, but one must select the correct tools to combine these prioritized tasks properly. In response to Zulfikar Ramzan’s statement about 1400 new cybersecurity companies coming on the market in the past year, Tim talked about the difficulty of picking the correct vendor for due to specific needs.

    December 09, 2016
  • What are the IT priorities for the US Department of the Navy? How is the Navy leveraging mobility solutions? What is the US Navy doing to enhance its IT security. Join host Michael Keegan as he explores these questions and more with Rob Foster, Chief Information Officer, U.S. Department of the Navy.

    December 05, 2016
  • During the far-ranging discussion, Ron Carback commented on the issues associated with not sharing information. If all agencies act as silos of information, we will see duplicated efforts across civilian and military agencies. This has many implications, including threats not being handled on a timely basis, the extra cost, and wasted talented when it comes to rebuilding.

    December 02, 2016
  • What are the key priorities for HHS’ OIG? What are the top management and performance challenges facing HHS? What are the characteristics of an effective inspector general? Join host Michael Keegan as he explores these questions and more with Daniel Levinson, Inspector General of the U.S. Dept of Health and Human Services.

    November 28, 2016
  • The viewpoint that RSA's chief technology officer Zulfikar Ramzan brought to the table is the ability to put the cybersecurity threat intelligence discussion within agencies in perspective with the commercial world. He reinforced the concept of a dichotomy in the world of threat intelligence. There is a balance in the need for trust and speed, but often times agencies require protracted reviews.

    November 22, 2016
  • Many federal, state, and local government agencies are operating old, outdated and end-of-life network equipment. You may think this just means slower, less efficient operation – not worth the cost to refresh your infrastructure, right? Wrong. Outdated network equipment is actually a major cybersecurity risk, particularly for government agencies, as it makes networks more susceptible to hacks and other forms of cyber-attacks.

    November 22, 2016
  • What are Veterans Health Administration’s strategic priorities? What is VHA doing to improve its organizational performance? What is VHA doing to advance healthcare innovation for veterans and the country? Join host Michael Keegan as he explores these questions and more with Dr. David Shulkin, Under Secretary for Health, Veterans Health Administration, US Dept of Veterans Affairs.

    November 14, 2016
  • Meet Jack and Zach. You may have seen them around in a variety of situations where Zach is happy and Jack is not. Why is that? Because Jack relies on aging, non-authorized infrastructure and service, that’s why! And while it might be funny to follow along with Jack and Zach’s exploits, here at Cisco we know that security is no laughing matter. We created Jack and Zach to get your attention about two major security concerns in the public sector: aging network infrastructure and non-FedRAMP-authorized cloud-based collaboration tools.

    November 14, 2016
  • How to do enterprise cloud computing with high assurance

    As more federal agencies move computing resources to the cloud – and they are – disaster recovery, data protection and assurance of availability of agency resources grow in importance.

    November 09, 2016
  • Before agencies can adopt a new technology, the government must ensure that it meets their strict standards and is correctly deployed to maximize security.

    November 04, 2016
  • The federal government is spending big bucks on connected technologies, otherwise known as the Internet of Things. Market research firm Govini estimated agencies spent almost $9 billion on these connected devices, with 56 percent of that increase on sensors alone.

    October 31, 2016