There is now more cyber guidance than ever for the companies that do business with the government. You can also expect even more when it comes to other new technologies, like artificial intelligence. Congress seems to be back up and running, and there is business to attend to. To start with, reauthorizing a major component of the Homeland Security Department, and also funding the rest of the government. For analysis, Federal Drive Executive Eric White spoke with Stephanie Kostro, Executive Vice President at the Professional Services Council.
In the fierce competition for cyber talent, a new study shows why agencies will need to develop innovative recruiting and retention programs, while also expanding pathways into the cyber workforce.
It’s never just one strategy, tactic or technology when it comes to cybersecurity. It’s a constant evolution that must simultaneously include investments in people, policy and tech. Get pointers from CISA, DARPA, IRS, ONCD and OPM in our new ebook.
Chris Cleary, the Department of the Navy’s principal cyber advisor, is most proud of his work around the Navy’s cyberspace superiority vision and work to better protect operational technology.
You scarcely hear the word "software" these days, without it being followed by "supply chain." One of the biggest topics in cybersecurity is how to make sure the thousands of pieces of a software program add up to something safe.
Drew Myklegard, the deputy federal chief information officer, said the draft memo to update FedRAMP creates a new oversight board and promotes agencies from similar sectors working together approve cloud services.
Gabe Camarillo, the undersecretary of the Army, said to create a culture of continuous improvement, the Army needs to institutionalize how it buys, develops and continually improve its applications.
CISA now has the equivalent of a perpetual "no-knock warrant" to probe the networks of federal agencies for major cyber vulnerabilities.
Randy Resnick is the director of Zero Trust Architecture Program Management Office in the DoD’s CIO’s office. A team of 17 to 18 people will analyze the zero trust plans submitted by 43 services and agencies.
CISA has taken on more responsibilities for the defense of federal agency networks. A new report considers how much farther that should go.
Traditional security controls are insufficient in protecting against major security breaches. They tend to be reactive, static, noncontextualized around threats and are often based on compliance requirements and information technology practices. As a result, traditional security controls are not responsive enough to anticipate, evolve and adapt to threat actors’ behaviors and activities.
Agencies are supposed to protect their data systems from cybersecurity threats, especially those known as high value asset systems. The Homeland Security Department office of inspector general looked at a high value asset system operated by the Transportation Security Administration.
The planned addition of facial recognition to Login.gov comes as GSA attempts to boost the program’s “identity proofing” capabilities.
Two tough new rules from the Federal Acquisition Regulation Council are coming, but originating with the Cybersecurity and Infrastructure Security Agency. They have to do with contractor incident reporting and for how contractors button up unclassified systems.
An urgent report from the Government Accountability Office is aimed at the State Department. GAO called for State to, in its words, "expeditiously get on with a cybersecurity risk management program." State has a plan, now it has to carry it out. For more on this, Federal Drive Host Tom Temin spoke with Jennifer Franks, GAO's Director of Information Technology and Cybersecurity.