What Happens After a Security Breach?
As agencies stand up zero trust strategies, federal and industry partners are working together on best practices for responding to cyber attacks and ensuring critical data and systems remain secured.
Inside, read insights featuring:
- Defense Department CISO David McKeown on Congress’ new cyber incident reporting mandate
- CISA’s draft model for what to do after a cyber incident
- Exterro Forensic Subject Matter Expert Justin Tolman on recovering from cyber attacks
- OMB Acting Director Shalanda Young on the breakdown of the maturity model for federal agencies to track information logs from their IT systems
-
Shane Barney CISO, USCIS
-
Chris Butera Technical Director for Cyber, CISA
-
Kimberly Denbow Managing Director for Security, American Gas Association
-
Michael Duffy Associate Director, Cybersecurity Division, CISA
-
Matt Hartman Deputy Executive Assistant Director of Cybersecurity, CISA
-
Heather Hogsett Senior Vice President, Bank Policy Institute
-
Kate Macri Senior Researcher, GovCIO Media & Research
-
David McKeown CISO, Department of Defense
-
Justin Tolman Forensic Subject Matter Expert, Exterro
-
Brandon Wales Executive Director, CISA
-
Navy Deputy CIO: Zero Trust Boosts Navy Cyber Defenses
Barry Tanner shares how the department is tackling zero trust amid evolving threats around supply chain disruptions and quantum.
5m read -
DoDIIS 2024: NGA Embraces AI/ML to Tackle Geospatial Intelligence Data Deluge
Mark Chatelain discussed the latest developments in NGA’s zero trust journey, the agency’s partnership with the private sector and the future of geospatial intelligence.
11m listen -
Intel CIOs Tout Zero Trust Efforts for Cyber Defenses
Officials said that access control and information sharing are critical to cybersecurity operations in the Intelligence Community.
4m read -
How Combatant Commands Are Thinking About Tech Modernization
Defense officials cite the need to modernize in pace with partner capabilities while also staying ahead of threats.
6m read