
Sign up to save your podcasts
Or
For the video of this podcast: The Cyber Wild West is Still Wild
Follow FedInsider on LinkedIn
When the United States expanded westward, citizens found that surprise could lurk around any corner, earning the nickname “the wild west.” Today, with unlimited storage, fast speeds, and artificial intelligence, our technical landscape can and should be considered just as wild.
This week on Feds At the Edge, we’ve gathered federal experts who corral malicious code and prevent bad actors from robbing you blind.
Marisol Cruz Cain, Director of Information and Cybersecurity Team for US GAO, highlights some of the unpublicized aspects of AI, like its ability to rewrite code which can make attribution difficult.
Paul Blahusch, CISO for the Department of Labor, shares where agencies should anticipate weaknesses and how funding should be appropriated.
JD Jack, General Manager for Google Public Sector Cybersecurity, talks how “security validation” can show you how to look at the tools you have, and find a way to evaluate them.
We also discuss “red” teams, independent groups used to attack a system to find any unanticipated weaknesses that need to be addressed.
Tune in now on your favorite podcasting platform to hear our experts weigh in on protecting your assets in the current “wild west” environment.
5
55 ratings
For the video of this podcast: The Cyber Wild West is Still Wild
Follow FedInsider on LinkedIn
When the United States expanded westward, citizens found that surprise could lurk around any corner, earning the nickname “the wild west.” Today, with unlimited storage, fast speeds, and artificial intelligence, our technical landscape can and should be considered just as wild.
This week on Feds At the Edge, we’ve gathered federal experts who corral malicious code and prevent bad actors from robbing you blind.
Marisol Cruz Cain, Director of Information and Cybersecurity Team for US GAO, highlights some of the unpublicized aspects of AI, like its ability to rewrite code which can make attribution difficult.
Paul Blahusch, CISO for the Department of Labor, shares where agencies should anticipate weaknesses and how funding should be appropriated.
JD Jack, General Manager for Google Public Sector Cybersecurity, talks how “security validation” can show you how to look at the tools you have, and find a way to evaluate them.
We also discuss “red” teams, independent groups used to attack a system to find any unanticipated weaknesses that need to be addressed.
Tune in now on your favorite podcasting platform to hear our experts weigh in on protecting your assets in the current “wild west” environment.