What Happens After a Security Breach?
As agencies stand up zero trust strategies, federal and industry partners are working together on best practices for responding to cyber attacks and ensuring critical data and systems remain secured.
Inside, read insights featuring:
- Defense Department CISO David McKeown on Congress’ new cyber incident reporting mandate
- CISA’s draft model for what to do after a cyber incident
- Exterro Forensic Subject Matter Expert Justin Tolman on recovering from cyber attacks
- OMB Acting Director Shalanda Young on the breakdown of the maturity model for federal agencies to track information logs from their IT systems
-
Shane Barney CISO, USCIS
-
Chris Butera Technical Director for Cyber, CISA
-
Kimberly Denbow Managing Director for Security, American Gas Association
-
Michael Duffy Associate Director, Cybersecurity Division, CISA
-
Matt Hartman Deputy Executive Assistant Director of Cybersecurity, CISA
-
Heather Hogsett Senior Vice President, Bank Policy Institute
-
Kate Macri Senior Researcher, GovCIO Media & Research
-
David McKeown CISO, Department of Defense
-
Justin Tolman Forensic Subject Matter Expert, Exterro
-
Brandon Wales Executive Director, CISA
-
Preparing for the Future Cyber Landscape
CISA, CFPB and Rubrik discuss how they’re building cybersecurity best practices and developing their workforces to prepare for the future threat landscape and bolster cyber resilience.
30m watch -
HUD’s New CIO Focuses on AI, Zero Trust
HUD's new CIO Sairah Ijaz is focusing on implementing artificial intelligence and zero trust to mature and secure the agency's IT framework.Â
4m read -
Defense Tech Developments to Watch in 2025
The new Fulcrum strategy sets up the Defense Department to shore up AI, zero trust and the workforce.
6m read -
Federal IT Trends in 2024, Outlook for 2025
Federal IT advancements in 2024 showcased the transformative potential of emerging technologies, particularly artificial intelligence.
2m read