What Happens After a Security Breach?
As agencies stand up zero trust strategies, federal and industry partners are working together on best practices for responding to cyber attacks and ensuring critical data and systems remain secured.
Inside, read insights featuring:
- Defense Department CISO David McKeown on Congress’ new cyber incident reporting mandate
- CISA’s draft model for what to do after a cyber incident
- Exterro Forensic Subject Matter Expert Justin Tolman on recovering from cyber attacks
- OMB Acting Director Shalanda Young on the breakdown of the maturity model for federal agencies to track information logs from their IT systems
Featuring
-
Shane Barney CISO, USCIS
-
Chris Butera Technical Director for Cyber, CISA
-
Kimberly Denbow Managing Director for Security, American Gas Association
-
Michael Duffy Associate Director, Cybersecurity Division, CISA
-
Matt Hartman Deputy Executive Assistant Director of Cybersecurity, CISA
-
Heather Hogsett Senior Vice President, Bank Policy Institute
-
Kate Macri Senior Researcher, GovCIO Media & Research
-
David McKeown CISO, Department of Defense
-
Justin Tolman Forensic Subject Matter Expert, Exterro
-
Brandon Wales Executive Director, CISA
Sponsor
Related Content
-
How TMF is Helping Agencies Accelerate Tech Modernization
The program launched a new AI pilot to expedite TMF applications as agency leaders urge more to consider applying for funds.
4m read -
Sea-Air-Space: Zero Trust is ‘The Best Approach’ For Military Cybersecurity
Marines Cyber Technology Officer Shery Thomas discusses identity management across networks and devices.
10m watch -
How Agencies are Justifying Budget Growth in AI, Zero Trust
IT leaders stressed the importance of understanding user knowledge and needs when prioritizing cybersecurity projects.
3m read -
DOJ Weighs 'Bring Your Own Devices' Amid Increased Threats
The agency wants stronger industry standards around cybersecurity before considering a more tailored mobile device policy.
2m read