Identity management from a secure perspective

Best listening experience is on Chrome, Firefox or Safari. Subscribe to Fed Tech Talk’s audio interviews on Apple Podcasts or PodcastOne.

This week on Federal Tech Talk, host John Gilroy interviews Mark McIntyre, chief security adviser, Cybersecurity Solutions Group at Microsoft.  McIntyre has worked for the federal government and has traveled the world for Microsoft, and  shares with us some of his insights on cybersecurity and large federal systems.

Head shot of McIntyre
Mark McIntyre, Microsoft

The discussion ranged from observations about micro segmenting networks to software defined perimeters.  McIntyre is a well-respected subject matter expert who can apply keen insight into these topics.

He brought to light some aspects of the Cybersecurity Maturity Model Certification (CMMC) initiative at the Department of Defense.  Some view the CMMC as not just another checklist.  In fact, it should be part of a flexible, adaptable method to change with future cyber-attacks.  It’s move away from self-attestation means that federal suppliers will have to be more rigorous with adherence to standards.

McIntyre gave some opinions on the Trusted Internet Connection and its evolution. But what is connected to the system? One topic that few mention is the state of the device you are using to access a network – device health.  Digital identity is a concern in commercial enterprise systems, McIntyre takes his federal experience and shows listeners how to apply identity management from a secure perspective.


Federal Tech Talk

TUESDAYS at 1:00 P.M.

Host John Gilroy of The Oakmont Group speaks the language of federal CISOs, CIOs and CTOs, and gets into the specifics for government IT systems integrators. Follow John on Twitter. Subscribe on Apple Podcasts or Podcast One.

Sign up for breaking news alerts