
Sign up to save your podcasts
Or
In grade school, we all learned about states capitals and the geographic shape of each state. When you compare the way they manage technology, they vary drastically as well. When it comes to the way states structure their technology, some states are hierarchical, some are centrally controlled. Each state presents a unique way to solve the same problem: cybersecurity.
Today’s discussion combines federal leaders with technology experts from three states. Each person brings a different aspect to the discussion. One overriding theme that Solomon Adote reinforces is the importance of identity management. It seems to be the first pillar in the transition to a zero-trust architecture for federal as well as local governments.
= = = = = = = = = =
“Cybersecurity at the state level is a very interesting topic to me because every state is structured differently, every state IT organizational structure is different, and some have a very hierarchical structure and others are very centrally controlled and managed.” Michael Mestrovich, Rubrik
“Many of these federal programs we have in the states that do the work and all the data and interact with the citizens.” Suzette Kent
“People of Colorado and the people of Colorado are at different levels and stages of IT proficiency” Craig Hurter, Colorado
“Russian affiliated, organizations, they all have the ability with significant resources at their disposal, I think some have close to 740,000 bots at their disposal to generate a significant amount of traffic against any entity.” Solomon Adote Delaware
“But there has been workforce development change has come as a result of that as well” Jason Cavendish Michigan
“More significant in the public sector but is shared by the private sector is the talent challenge” Suzette Kent
Twitter: @FedInsider
LinkedIn: https://www.linkedin.com/company/fedinsider/
Facebook: https://www.facebook.com/FedInsiderNews
5
55 ratings
In grade school, we all learned about states capitals and the geographic shape of each state. When you compare the way they manage technology, they vary drastically as well. When it comes to the way states structure their technology, some states are hierarchical, some are centrally controlled. Each state presents a unique way to solve the same problem: cybersecurity.
Today’s discussion combines federal leaders with technology experts from three states. Each person brings a different aspect to the discussion. One overriding theme that Solomon Adote reinforces is the importance of identity management. It seems to be the first pillar in the transition to a zero-trust architecture for federal as well as local governments.
= = = = = = = = = =
“Cybersecurity at the state level is a very interesting topic to me because every state is structured differently, every state IT organizational structure is different, and some have a very hierarchical structure and others are very centrally controlled and managed.” Michael Mestrovich, Rubrik
“Many of these federal programs we have in the states that do the work and all the data and interact with the citizens.” Suzette Kent
“People of Colorado and the people of Colorado are at different levels and stages of IT proficiency” Craig Hurter, Colorado
“Russian affiliated, organizations, they all have the ability with significant resources at their disposal, I think some have close to 740,000 bots at their disposal to generate a significant amount of traffic against any entity.” Solomon Adote Delaware
“But there has been workforce development change has come as a result of that as well” Jason Cavendish Michigan
“More significant in the public sector but is shared by the private sector is the talent challenge” Suzette Kent
Twitter: @FedInsider
LinkedIn: https://www.linkedin.com/company/fedinsider/
Facebook: https://www.facebook.com/FedInsiderNews