What Happens After a Security Breach?
Share
As agencies stand up zero trust strategies, federal and industry partners are working together on best practices for responding to cyber attacks and ensuring critical data and systems remain secured.
Inside, read insights featuring:
- Defense Department CISO David McKeown on Congress’ new cyber incident reporting mandate
- CISA’s draft model for what to do after a cyber incident
- Exterro Forensic Subject Matter Expert Justin Tolman on recovering from cyber attacks
- OMB Acting Director Shalanda Young on the breakdown of the maturity model for federal agencies to track information logs from their IT systems
Featuring
-
Shane Barney CISO, USCIS -
Chris Butera Technical Director for Cyber, CISA -
Kimberly Denbow Managing Director for Security, American Gas Association -
Michael Duffy Associate Director, Cybersecurity Division, CISA -
Matt Hartman Deputy Executive Assistant Director of Cybersecurity, CISA -
Heather Hogsett Senior Vice President, Bank Policy Institute -
Kate Macri Senior Researcher, GovCIO Media & Research -
David McKeown CISO, Department of Defense -
Justin Tolman Forensic Subject Matter Expert, Exterro -
Brandon Wales Executive Director, CISA
Sponsor
Related Content
-
Agencies Take on IT Modernization
Navy and Marine Corps models show how outcome-driven modernization is reshaping federal IT.
20m read -
New DOW Cyber Construct Aims for ‘Machine-Speed’ Defense
CSRMC embeds automation, telemetry and secure‑by‑design principles to outpace modern adversaries and unify risk posture.
4m read -
How the Navy is Scaling Zero Trust With Flank Speed
Cyber officials say cloud platforms like Flank Speed are key to applying zero trust across enterprise IT and operational technology systems.
3m read -
Federal IT Trends in 2025, Outlook for 2026
Hear from federal IT officials on the biggest tech trends from 2025 and how they will influence modernization priorities in 2026.
20m read