CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today. 213656
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading
The #NowClimbing Cybercast follows 2x Olympian and Run Gum CEO Nick Symmonds up and down the tallest mountains in the world. As a youth, Nick had two goals; become an Olympian and climb to the top of Mt. Everest. After a 10+ year career as a professional runner, he how now shifted his focus as he looks to become the first human to break the 4-minute mile barrier and reach earth's tallest peak. Follow along with daily updates from the mountain. Learn more at rungum.com/nowclimbing
…
continue reading
With the release of NIST Cybersecurity Framework 2.0, CIS felt strongly that an update to The Controls was necessary to crossmap to CSF 2.0. Specifically the strongest driver, was the release of the Govern function. Co-hosts: Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/ Brian Blakely: https://www.linkedin.com/in/bblakley/ Eric Wo…
…
continue reading
CyberCast, along with GovCast and HealthCast, will now be published in the GovCIO Media & Research Podcasts feed. Subscribe and listen today on the podcast platform of your choice.저자 GovCIO Media & Research
…
continue reading
1
Education CISO Breaks Down ICAM Progress for Zero Trust Goals
50:18
50:18
나중에 재생
나중에 재생
리스트
좋아요
좋아요
50:18
The Department of Education is kicking off the second phase of its zero trust strategy by focusing on security orchestration and automation response to stay ahead of the evolving threat landscape. Education CISO Steven Hernandez discusses how the agency is tailoring its cyber tools and technologies by automating manual processes and leveraging iden…
…
continue reading
Federal agencies are modernizing their cybersecurity strategies as threats continue to evolve. Faced with the National Cybersecurity Strategy, zero-trust implementation and recruiting a cyber workforce, agencies are primed for a busy 2024 in cyber and IT. Managing Editor Ross Gianfortune and Staff Writer/Researchers Nikki Henderson Whitfield and Jo…
…
continue reading
The White House released its National Cybersecurity Strategy in March and is ending the year with the first permanent National Cyber Director in nearly a year. On CyberCast, we covered it all. Take a listen back to some of the highlighted interviews with federal IT leaders, officials and experts this year as CyberCast traveled to Hawaii, California…
…
continue reading
1
Season 5 Episode 24 - A Look at Zero Trust in Defense Indo-Pacific Region
22:08
22:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:08
This episode we're diving into zero trust at the Defense Department. Specifically, how that is playing out for the Indo-Pacific region. We recently had the opportunity to connect with several leaders at the AFCEA TechNet Indo-Pacific conference in Honolulu where they shared with us how they're thinking about this quickly changing landscape and what…
…
continue reading
1
Season 5 Episode 23 - FEMA is Leveraging AI to Secure Networks
18:07
18:07
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:07
FEMA is developing prototypes for AI use cases in cybersecurity implementation amid a White House artificial intelligence executive order that directs agencies to establish and maintain standards for safety and security of the technology. FEMA CISO Gregory Edwards discusses how the rapid pace of AI innovation is spurring partnerships across federal…
…
continue reading
1
Season 5 Episode 22 - National Cyber Strategy Supports a More Resilient Water System
39:25
39:25
나중에 재생
나중에 재생
리스트
좋아요
좋아요
39:25
The Environmental Protection Agency is honing in on multiple pillars from the National Cybersecurity Strategy to secure critical infrastructure at its water and waste-water operations. The agency deems water security to be national security and is an area that needs critical attention. Efforts are underway to increase cyber awareness in the water s…
…
continue reading
1
Season 5 Episode 21 - The Cybersecurity Talent Gap Peak Challenge for the Government
16:16
16:16
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:16
The U.S. Digital Corps is bringing innovation to government by placing early-career technologists at agencies. Operated by the General Services Administration (GSA) Technology Transformation Services (TTS), the Corps’ fellowship program gives individuals the chance to work on critical issues at the intersection of technology and public service. Dig…
…
continue reading
1
Season 5 Episode 20 - How Government is Balancing Data Access and Security
17:23
17:23
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:23
Bad actors accessing sensitive government data through vulnerable weak points is an ongoing concern for federal IT officials, who are making securing data a top priority amid digital modernization. Challenges in data security arise when you need to balance it with efficient data access while keeping threat actors out. In this episode, we break down…
…
continue reading
1
Season 5 Episode 19 - US Digital Corps is Bringing Cybersecurity Innovation to Government
17:59
17:59
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:59
The U.S. Digital Corps is bringing innovation to agencies through early-career technologists. Operated by the General Services Administration (GSA) Technology Transformation Services (TTS), the Corps’ fellowship program gives individuals the ability to find themselves working on critical issues at the intersection of technology and public service. …
…
continue reading
1
Season 5 Episode 18 - JCDC Strengthens U.S. Cyber Posture Through Global Partnerships
36:04
36:04
나중에 재생
나중에 재생
리스트
좋아요
좋아요
36:04
JCDC Partnerships International, which sits within CISA’s cybersecurity division, works with 150 partners worldwide with the goal of sharing and exchanging critical information allowing the U.S. to respond to cyber threats faster, protect the country’s critical infrastructure more effectively and relay that information to its international counterp…
…
continue reading
1
Season 5 Episode 17 - A Look Inside VA’s ‘Zero Trust First’ Cybersecurity Approach
22:23
22:23
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:23
The Department of Veterans Affairs is amid a cybersecurity modernization plan to put identity management and zero trust at the forefront of the biggest security threats facing technology teams. Jeff Spaeth, deputy CISO and executive director of information security operations at VA, is a bit of a boomerang. A veteran himself and longstanding cybers…
…
continue reading
1
Season 5 Episode 16 - The Intelligence Community Cites Tech Changes, Challenges in Framework
26:13
26:13
나중에 재생
나중에 재생
리스트
좋아요
좋아요
26:13
In its recently released National Intelligence Strategy, the Office of the Director of National Intelligence outlines the strategic direction for the Intelligence Community (IC) over the next four years. In it, Director of National Intelligence Avril Haines notes the dramatically changing environment in which the IC operates, including the IT envir…
…
continue reading
1
Season 5 Episode 15 - The White House Wants to Fix the Cybersecurity Workforce
27:49
27:49
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:49
The White House recently released it National Cyber Workforce and Education Strategy to enhance and unleash America's cyber talent. The plan addresses the workforce needs in the public and private sectors by introducing cybersecurity concepts throughout all levels of education. The document proposes making advanced occupational training in cyber mo…
…
continue reading
1
Season 5 Episode 14 - GovFocus Preview: Zero Trust Enabling the Future Joint Force
7:20
7:20
나중에 재생
나중에 재생
리스트
좋아요
좋아요
7:20
Military cyber leaders repeatedly say zero trust is critical, essential and integral to the Defense Department's Joint All-Domain Command-and-Control (JADC2) concept. A zero trust approach to cybersecurity helps organizations improve data security, manage users on the network and facilitate data interoperability, all key components of JADC2. Enjoy …
…
continue reading
1
CIS Control 18 - Penetration Testing - Sponsored by Hacket Cyber
1:06:26
1:06:26
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:06:26
Penetration testing is something that more companies and organizations should be considering a necessary expense. Pen Testing is an important aspect of discovery and identifying potential critical vulnerabilities within your organizations external network, internal network, applications, or systems. They provide a valuable insight on how your digit…
…
continue reading
1
Season 5 Episode 13 - Where the White House Wants Agencies to Prioritize Cybersecurity Investments
13:55
13:55
나중에 재생
나중에 재생
리스트
좋아요
좋아요
13:55
The Office of Management and Budget along with the Office of the National Cyber Director released a memo laying out cybersecurity investment areas that agencies will have to include as they make their budgetary decisions for the next fiscal year. We break down those investment areas, how it ties to the recently released National Cybersecurity Strat…
…
continue reading
1
Season 5 Episode 12 - AI, Machine Learning Play a Critical Role in Enhancing NOAA's Overall Mission
37:07
37:07
나중에 재생
나중에 재생
리스트
좋아요
좋아요
37:07
Emerging technologies are proving to be very beneficial to the National Oceanic Atmospheric Administration when it comes to climate modeling, behavior analytics and its overall mission. Not only has automation technologies played a key role in NOAA's weather forecasting and environmental monitoring, but also machine learning has been a huge help in…
…
continue reading
1
Season 5 Episode 11 - How Security Fits into VA’s Modernized Cloud Journey
29:34
29:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
29:34
Since 2018, the Department of Veterans Affairs has been on a journey to the cloud to streamline operations, drive down expenses, better protect data and improve business operations. The agency’s Deputy Director of Infrastructure Operations Kendall Krebs explains how VA is looking to not only use cloud to improve the speed and quality of its applica…
…
continue reading
1
CIS Control 17 - Incident Response Management - Sponsored by Exigence
53:38
53:38
나중에 재생
나중에 재생
리스트
좋아요
좋아요
53:38
The biggest takeaway from CIS Control 17 is that planning and communication are critical when responding to an incident. The longer an intruder has access to your network, the more time they’ve had to embed themselves into your systems. Communicating with everyone involved can help limit the duration between attack and clean-up. Establish a program…
…
continue reading
1
Season 5 Episode 10 - Marine Corps is Building a Unified Network to Operate in Highly Distributed Environments
41:55
41:55
나중에 재생
나중에 재생
리스트
좋아요
좋아요
41:55
The Marine Corps is on track to being one of the most distributed forces ever with significant command, control, communications, intelligence and cyber capabilities. A unified network with modernized network equipment is critical to operating in this environment. Cyber Technology Officer Shery Thomas discusses the Marine Crops’ efforts to combine n…
…
continue reading
1
Season 5 Episode 9 - Army is Accelerating Zero Trust Adoption with a New Office
23:45
23:45
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:45
The ultimate goal of the Army’s recently established Zero Trust Functional Management Office is to have a secure unified network that is defended by a fully implemented zero trust framework that will enable multi-domain operations and accomplish the Army’s missions. Col. Michael Smith, director of this office, details next steps for zero trust impl…
…
continue reading
1
Live from AFCEA TechNet Cyber: How the Pentagon Plans to Fill 30,000 Open Cyber Positions
21:52
21:52
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:52
The Pentagon has a cyber workforce problem: 30,000 cyber positions remain unfilled, but malicious cyber activity isn’t slowing down. Defense cyber leaders warn future conflicts will combine kinetic and information warfare, elevating the importance of a robust cyber workforce. DOD Principal Director for Resources & Analysis Mark Gorak joins us live …
…
continue reading
1
Live from AFCEA TechNet Cyber: JADC2 Informs Cloud, Cyber Initiatives at Pentagon
14:35
14:35
나중에 재생
나중에 재생
리스트
좋아요
좋아요
14:35
Defense Department CIO John Sherman joins us live from TechNet Cyber 2023 in Baltimore, Maryland, to peel back the layers of the Joint Warfighting Cloud Capability (JWCC) and the department’s zero trust strategy to show how they’re informed by JADC2 priorities and contribute to better data transport and interoperability with coalition partners. She…
…
continue reading
1
Live from AFCEA TechNet Cyber: The Role of Software in the Future Defense Mission
32:00
32:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
32:00
Live from TechNet Cyber 2023 in Baltimore, Maryland, Defense Department Deputy CIO Lily Zeleke and Chief Software Officer Rob Vietmeyer discuss software factories, DevSecOps, zero trust and the Joint Warfighting Cloud Capability (JWCC). These IT modernization initiatives are transforming the department to be more tech-savvy as information dominance…
…
continue reading
1
Live from AFCEA TechNet Cyber: Army Cyber Command Tackles Emerging Trends, Cyber Workforce
13:33
13:33
나중에 재생
나중에 재생
리스트
좋아요
좋아요
13:33
Operating and hardening the Defense Department’s networks is a highly complex undertaking. Training and retaining the workforce, keeping up with a constantly changing environment of technology and emerging capabilities and threats are continuous challenges not just for the Army, but also for all the services. Lt. Gen. Maria Barrett, commanding gene…
…
continue reading