• Federal Report Supply Chain/CMMC

    Learn from leaders at DoD, NIST, NTIA, and CISA on how agencies are reevaluating their security posture. Featuring additional insights from technology leaders at Trustwave, Qmulos, Zscaler, Solarwinds, and MicroFocus Government Solutions.


    • CMMC, Supply Chain, All
  • Managing Cyber Exposure in Law Enforcement

    Michael Rothschild, Senior Director of Marketing for Tenable, shares advice for protecting data and resources as the cybercrime landscape expands and evolves.


    • CMMC, Law Enforcement, Tenable
  • The Zero Trust Approach to Cyber Starts from the Inside

    John Davis, Vice President of Public Sector at Palo Alto Networks, explains how the concept of protecting from the inside of their IT infrastructures out (instead of the outside in) helps move agencies toward a Zero Trust approach.


    • CMMC, Cybersecurity , Palo Alto Networks
  • Gaining Greater Network Visibility Leads to Greater Digital Transformation Success

    Dennis Reilly, Vice President of Public Sector at Gigamon, explains why agencies need visibility of all data in transit, on premise or in the cloud so leaders can determine where security issues exist and secure these vulnerabilities.


    • CMMC, Cybersecurity , Gigamon
  • Leaders In Innovation: Cloud Edition Interview

    Steve Harris, Senior Vice President and General Manager for Public Sector at Dell Technologies, and Bill Rowan, Vice President for Federal Sales at VMware, discuss the latest developments in cloud with Federal News Network’s Executive Editor Jason Miller.


    • Cloud, CMMC, Dell Technologies, VMware
  • Agencies Must Get Identity Right to Move to a Zero Trust, More Secure Posture

    Morey Haber, Chief Technology Officer & Chief Information Security Officer at BeyondTrust, and Frank Briguglio, Global Public Sector Strategist at SailPoint, explain how identity affects every aspect of cybersecurity for government agencies.


    • CMMC, Cybersecurity , BeyondTrust, SailPoint
  • The Evolution of Trusted Connections

    Habib Hourani, Solutions Engineer at Okta, discusses how zero trust and adaptive security workflows support more robust cloud environments.


    • Cloud, CMMC, Cybersecurity , Okta
  • Visibility is Essential for Cloud Security

    Ashok Sankar, Director of Industry Marketing, Public Sector and Education at Splunk, explains why managing a secure cloud requires continuous monitoring of all relevant data for meaningful insights.


    • Cloud, CMMC, Cybersecurity , Splunk
  • How the Cloud is Redefining Security

    Stephen Kovac, Vice President of Global Government at Zscaler, describes how TIC 3.0 is allowing agencies to extend security to users beyond the network’s perimeter.


    • Cloud, CMMC, Cybersecurity , Zscaler
  • Rise of IoT, OT, Other Non-Traditional Devices Requires a New Approach to Cybersecurity

    Dean Hullings, Global Defense Solutions Strategist at Forescout, examines how identity and access management and training affect mission delivery.


    • CMMC, Cybersecurity , Forescout
  • Remote Work Is Here to Stay

    Like many cybersecurity leaders, MK Palmore, VP and Field CSO for Palo Alto Networks, foresees state and local governments will continue remote work after the pandemic subsides. In this Q&A, he discusses the threat landscape and strategies for securing remote access now and in the future.


    • CMMC, Cybersecurity , Palo Alto Networks
  • A Better Approach to Telework Security

    Morey J. Haber, CTO and CISO of BeyondTrust, explains why privileged access management and cloud-based security are essential for protecting a remote workforce.


    • CMMC, Cybersecurity , BeyondTrust
  • Visibility and the Quest for Zero Trust

    Telework is here to stay; Dennis Reilly, Vice President of Public Sector at Gigamon, analyzes how agencies can adapt with pervasive network visibility and analytics.


    • CMMC, Cybersecurity , Gigamon
  • Cyber Leaders on Identity Management

    Government leaders from the DoD, DoJ, FDIC and Agriculture Department join industry leaders from Radiant Logic, CyberArk, Okta and SailPoint to discuss the role of Identity Management in enabling more efficient access to resources and improving protection and authentication strategies.


    • CMMC, Cybersecurity , CyberArk, Okta, Radiant Logic, SailPoint
  • The Key to Securing Cloud Resources

    As adversaries increasingly target IT administrators, David McNeely, Chief Strategy Officer of Centrify, explores how privileged access management rises to the challenge.


    • CMMC, Cybersecurity , Centrify