With an ever-growing attack surface, it is impossible to know every single cyber threat or attack vector. But federal agencies have found the best defense is inside a culture of sharing.

The Department of Homeland Security leads the way with an evolving methodology to stay ahead of the crashing wave: continuous, careful exchange of information.

In this Expert Edition: Security Strategies in Government, we discuss a range of cyber efforts: from the EINSTEIN program’s artificial intelligence that hastens threat sharing, to the Cybersecurity Vulnerability Identification and Notification Act that would compel internet service providers to turn over contact information for entities with critical cyber vulnerabilities.

By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.

Please register using the form on this page.
Have questions or need help? Visit our Q&A page for answers to common questions or to reach a member of our team.

By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.