About Kerry Rea President of GovEvents

Twitter: @Kerry_Rea | LinkedIn: www.linkedin.com/in/kerryrea/ I am a business and marketing professional with an extensive background in company start-ups. I have 20+ years direct experience in the information technology, government, franchise, and construction industries. Having a passion for business, I love brainstorming, collaborating and strategizing on the best ways to achieve our clients' and partners' business objectives.

Creating an Inventory of Tech and People for More Secure Systems

Moving to a zero-trust model for cybersecurity is dependent on understanding who and what needs access to your network. While simple to say, it is not as simple to do. Government agencies are currently focused on ensuring they have the full picture of what is on the network and who they need to support securing those assets.

Defining the Ecosystem

As agencies progress on their zero-trust journey, understanding every piece that touches networks becomes critical. These touchpoints often extend beyond traditional technology solutions. The growth of Internet of Things (IoT) devices introduces operational technology into the IT architecture.

Edge computing devices being used by field staff, sensors, and cameras all provide valuable data and efficiency, but they also provide an entry point for bad actors. Because of this, the Office of Management and Budget has tasked agencies with creating an IoT Inventory by the end of fiscal 2024. The memo details the breadth of devices to be inventoried, including building maintenance systems, environmental sensors, specialized equipment in hospitals and laboratories, and more. With this inventory in place, agencies will be able to take advantage of a new working group on the CISO Council, which will define IoT and OT security best practices.

New Approach = New Talent

With cybersecurity permeating every aspect of government operations - from traditional IT to the operational systems mentioned above - we need to take a look at how we train the federal workforce. With a recognized cybersecurity skills gap, new efforts are underway to grow a workforce trained and able to take on cybersecurity challenges.

  • The Federal Cybersecurity Workforce Expansion Act has been introduced to grow the federal cybersecurity workforce through the creation of several programs including a focus on providing cybersecurity training to veterans.
  • Keeping cyber talent in government is just as critical as training new talent. The Office of Personnel Management has created the cyber rotational program to allow federal employees to move to details at other agencies, providing the opportunity for growth within the federal government.
  • The National Geospatial-Intelligence Agency is building its cyber ranks with the next generation. It created a program to hire high school students as interns and give them top-secret security clearances to work on mission-critical work.

GovEvents and GovWhitePapers have a host of resources that detail how agencies can get a handle on the things they need to secure and the people they need to do that work.

  • Identify, Evaluate & Prioritize Industrial Cyber Risk (January 10, 2024; webcast) - Industrial control system (ICS) security represents one of the more challenging areas for security professionals. It's often a legacy system that wasn't designed with security in mind and, because it's different from traditional IT assets, it has very different security requirements. And no surprise--such systems are increasingly targeted by sophisticated cyberattackers, including ransomware gangs and nation-state actors. Learn how to harden OT assets against cyber-threats, identify critical endpoint vulnerabilities and risks, enable rapid recovery, and more.
  • Bridging the Cybersecurity Talent Gap in Government (January 11, 2024; webcast) - Navigating the unique challenges of the government and public sector demands a specialized approach to cybersecurity talent. This session will unveil groundbreaking methods, from upskilling your current team to leveraging a pre-vetted cybersecurity talent pool. It will also explore government-funded cybersecurity training programs to enhance your workforce.
  • Federal News Network's Industry Exchange Cyber (January 22, 2024; webcast) - Gain a perspective on cybersecurity issues critical to government: intelligence, endpoint management and remediation, identity security, cybersecurity asset management, and security orchestration and response.
  • CyberSmart 2024: Cybersecurity Faces a Rapidly Changing Landscape (January 25, 2024; Reston, VA) - Just as agencies are implementing zero-trust architecture to help with this wave, other IT developments are threatening to upend cybersecurity even more. Artificial intelligence is being incorporated into software, even as elected officials and regulatory agencies are trying to develop new rules of the road for its use. At the same time, historically offline operations technology is beginning to be integrated with IT systems, opening up the OT to attacks that previously weren't feasible.
  • Cybersecurity (white paper) - The increasing use of communication technologies relying on complex data, technology, communication, and interconnectivity has expanded attack surfaces and increased the potential risk of malicious exploitation. The Department of Homeland Security Science & Technology's Cybersecurity Program leverages multidisciplinary expertise to research, analyze, and develop cutting-edge cybersecurity technologies and capabilities to improve the protection and resilience of our national critical infrastructure and federal and state departments and agencies.
  • Accelerate Cybersecurity Mandate Compliance (white paper) - In the push to comply with a multitude of cybersecurity mandates, federal agencies are faced with challenges of cost, complexity, and delays to achieve full compliance. Failure to fully implement the requirements of these mandates, however, is not an option when critical infrastructure, public services, and national security are at risk from an ever-expanding threat landscape.
  • Building the Cybersecurity Workforce Pipeline (white paper) - This report analyzes the National Centers of Academic Excellence in Cyber (NCAE-C), a consortium of institutions designated as centers of excellence by the National Security Agency, to determine how NCAE-C designated institutions fare compared to other schools in graduating students with cyber-related degrees and credentials.

For more on the government's path to zero trust, explore the resources available on GovEvents and GovWhitePapers.

Department Spotlight: Department of Commerce

The Department of Commerce's mission is to create the conditions for economic growth and opportunity for all communities. With 13 bureaus, it serves as the voice of business in the Federal Government and spurs the growth of quality jobs in communities across the country.

Commerce plays a huge role in innovation and advanced computing. Commerce is the department that oversees the efforts of the National Institute of Standards and Technology (NIST) and the National Telecommunications and Information Administration (NTIA) to provide guidelines around secure and equitable technology use. Additionally, the National Oceanic and Atmospheric Administration's (NOAA) leading climate science research and the U.S. Patent and Trademark Office's (USPTO) work to protect American IP are also housed under Commerce. Continue reading

Checking Up on Digital Health Solutions

The health industry has always leaned into emerging technologies to help it become more efficient and effective in delivering patient care. Like a doctor's stethoscope or an X-ray machine, today's digital solutions are part of a continuing evolution of medical tools that enhance and inform provider care. Of course, this use of technology must be thoughtful and careful not to replace doctors or their decisions with computer-generated suggestions.

The government's role of oversight into healthcare delivery is a careful balancing act of encouraging innovation while ensuring patient safety. From medical devices to artificial intelligence (AI), regulations are evolving to ensure healthcare gains efficiencies and insights from digital solutions while maintaining patient protections. In fact, the Food and Drug Administration recently created a new Digital Health Advisory Committee to help support the development of digital health technologies and their regulation. This committee will examine a wide variety of technologies and issues, including AI, cyber security, and equity in healthcare delivery. Continue reading

The Next Technology Horizon for Law Enforcement

With rising crime rates and staffing challenges, law enforcement agencies are looking at new ways to utilize technology and data to become more efficient in protecting our communities. A recent report from Thomson Reuters found that 48 percent of law enforcement respondents said that staffing was their top issue of concern with two-thirds placing staffing within their top three areas of concern. Technology has been an answer to staffing and effectiveness concerns with tools like body-worn cameras, license-plate readers, and video surveillance being widely implemented in departments of all sizes. But to continue to meet efficiency and effectiveness goals, law enforcement agencies have to start looking beyond these traditional technologies to more cutting edge and IT-based solutions.

Drones

Drones are becoming a powerful tool for law enforcement agencies to extend the eyes and ears of their teams. Increasingly drones are being used as first responders to scan a situation to provide context and information back to responding officers before they get on the scene. This use extends from routine noise complaint calls to domestic disputes to large scale emergencies. In all of these situations, drones are able to get to a location faster than humans and provide exact location and situational awareness for officers to be more precise in their response. Continue reading

DoD’s Efforts to Make Emerging Technology Established Technology

The U.S. Department of Defense's (DoD) shift from a focus on counterterrorism to one of near-peer rivals has highlighted the need to incorporate emerging technologies into the DoD faster than ever before. To keep up with the technological advances of peer nations, it is critical that the DoD speed the time to the field of technologies that can give our troops an advantage in terms of intelligence, data sharing, and visibility. But in this need for speed, the security and the reliability of these solutions cannot be ignored.

DoD is successfully striking the balance of speed, innovation, and reliability with several recent implementations of emerging technology. Continue reading