Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
ThreatLocker CEO and co-founder Danny Jenkins joined host John Gilroy on this week's Federal Tech Talk to discuss cybersecurity. zero trust software, and issues brought up by the Log4j cyber attack.
The agency is also looking to take better advantage of an “explosion” in commercial earth data.
The top 10 Reporter’s Notebook stories in 2021 demonstrated the popularity of topics ranging from IT modernization to cybersecurity to large contract vehicles.
The Biden Administration has made zero trust a priority for the federal government, going so far as to release an executive order directing agencies to develop cybersecurity plans that include zero trust architecture.
Former federal technology executives offer their insights of the biggest stories of 2021 and which storylines will carry over in 2022.
The Office of Management and Budget released the annual Federal Information Security Management Act (FISMA) guidance with a focus on risk-based, data-drive decisions.
John Simms, the deputy branch chief of the Cybersecurity Assurance Branch in CISA, said all the guidance is helping agencies shift their cyber thinking away from the network and closer to the data.
Successful zero trust implementation will be contingent on agencies’ understanding of basic zero trust principles, their understanding of the benchmarks outlined in CISA’s Zero Trust Security Model.
Agencies have seen a deluge of new guidance and standards, but a top White House cyber official says it's time to execute on the EO's goals.
Date: On demand Duration: 1 hour Cost: No Fee Description Zero trust architecture has come to the forefront of government agency cyber strategies in the last year, but how are agencies implementing and managing their zero trust…
Steven Hernandez, Education’s chief information security officer, said interagency data-sharing initiatives to strengthen authentication for zero trust could also lay the groundwork for shared services around identity and authentication for zero trust.
By specifically ordering agencies to re-prioritize budgets, officially moving risk to the agency CIO, and offering up alternative funding like the TMF and CDM programs, OMB and the administration is signaling that cybersecurity is no longer subservient to mission priorities.
For businesses and organizations, achieving true zero trust architecture means looking toward identity-based solutions that are flexible and can support the work-from-anywhere environment.
Maj. Gen. Matthew Easley, director, cybersecurity and chief information security officer, and the Army’s chief information officer, said it is key cybersecurity professionals use five functions.