What Happens After a Security Breach?

As agencies stand up zero trust strategies, federal and industry partners are working together on best practices for responding to cyber attacks and ensuring critical data and systems remain secured.
Inside, read insights featuring:
- Defense Department CISO David McKeown on Congress’ new cyber incident reporting mandate
- CISA’s draft model for what to do after a cyber incident
- Exterro Forensic Subject Matter Expert Justin Tolman on recovering from cyber attacks
- OMB Acting Director Shalanda Young on the breakdown of the maturity model for federal agencies to track information logs from their IT systems

-
Shane Barney CISO, USCIS
-
Chris Butera Technical Director for Cyber, CISA
-
Kimberly Denbow Managing Director for Security, American Gas Association
-
Michael Duffy Associate Director, Cybersecurity Division, CISA
-
Matt Hartman Deputy Executive Assistant Director of Cybersecurity, CISA
-
Heather Hogsett Senior Vice President, Bank Policy Institute
-
Kate Macri Senior Researcher, GovCIO Media & Research
-
David McKeown CISO, Department of Defense
-
Justin Tolman Forensic Subject Matter Expert, Exterro
-
Brandon Wales Executive Director, CISA
-
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Powering Defense with Transparent AI
AI and data innovation are transforming the Defense Department’s operations through cutting-edge initiatives.
20m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read -
DOD Cyber Strategy to Adapt to New Budgets, Tech Innovation
Budgetary pressures spur innovation as department tackles aging infrastructure and evolving threats, says top cyber official.
4m read