
Sign up to save your podcasts
Or
On January 16, 2025, the Biden administration released the capstone Executive Order “Strengthening and Promoting Innovation in the Nation’s Cybersecurity.” In this bonus episode of TechnologIST Talks, Chief Strategy Officer Megan Stifel and Chief Trust Officer Steve Kelly are joined by Carole House, Special Advisor for Cybersecurity and Critical Infrastructure Policy at the National Security Council and a member of the office responsible for leading the drafting of the EO. Megan, Steve, and Carole walk through the main components of the order, talking about its implications for federal systems security, quantum, efforts to tackle cybercrime and fraud, and more.
“Software is such a prevalent root cause of so many of the supply chain attacks that we’re seeing and that have been occurring. It’s the next step of evolution. We are requiring software vendors to provide verifiable attestations of those software practices,” Carole said.
What prompted the drafting and release of this Executive Order? How does the EO address ransomware? And what should government–and industry–take away from its provisions? Join us for this and more on this episode of TechnologIST Talks.
Learn more about IST:
https://securityandtechnology.org/
On January 16, 2025, the Biden administration released the capstone Executive Order “Strengthening and Promoting Innovation in the Nation’s Cybersecurity.” In this bonus episode of TechnologIST Talks, Chief Strategy Officer Megan Stifel and Chief Trust Officer Steve Kelly are joined by Carole House, Special Advisor for Cybersecurity and Critical Infrastructure Policy at the National Security Council and a member of the office responsible for leading the drafting of the EO. Megan, Steve, and Carole walk through the main components of the order, talking about its implications for federal systems security, quantum, efforts to tackle cybercrime and fraud, and more.
“Software is such a prevalent root cause of so many of the supply chain attacks that we’re seeing and that have been occurring. It’s the next step of evolution. We are requiring software vendors to provide verifiable attestations of those software practices,” Carole said.
What prompted the drafting and release of this Executive Order? How does the EO address ransomware? And what should government–and industry–take away from its provisions? Join us for this and more on this episode of TechnologIST Talks.
Learn more about IST:
https://securityandtechnology.org/