19 subscribers
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية


Season 5 Episode 11 - How Security Fits into VA’s Modernized Cloud Journey
Manage episode 366056536 series 2417460
Since 2018, the Department of Veterans Affairs has been on a journey to the cloud to streamline operations, drive down expenses, better protect data and improve business operations. The agency’s Deputy Director of Infrastructure Operations Kendall Krebs explains how VA is looking to not only use cloud to improve the speed and quality of its application development, but also secure this digital environment — leveraging platforms like VA Platform One (VAPO) to speed authority to operate and trim application deployment cycles. Throughout this journey, culture change is key. Krebs dives into next steps and latest updates.
109 حلقات
Manage episode 366056536 series 2417460
Since 2018, the Department of Veterans Affairs has been on a journey to the cloud to streamline operations, drive down expenses, better protect data and improve business operations. The agency’s Deputy Director of Infrastructure Operations Kendall Krebs explains how VA is looking to not only use cloud to improve the speed and quality of its application development, but also secure this digital environment — leveraging platforms like VA Platform One (VAPO) to speed authority to operate and trim application deployment cycles. Throughout this journey, culture change is key. Krebs dives into next steps and latest updates.
109 حلقات
كل الحلقات
×
1 Head to our new channel for episodes like "FBI’s 2025 Cybersecurity Priorities" 24:24


1 Education CISO Breaks Down ICAM Progress for Zero Trust Goals 50:18

1 A Look at Federal Cybersecurity Trends in 2024 28:06

1 Top 2023 Federal Cybersecurity Trends to Follow 25:15

1 Season 5 Episode 24 - A Look at Zero Trust in Defense Indo-Pacific Region 22:08

1 Season 5 Episode 23 - FEMA is Leveraging AI to Secure Networks 18:07

1 Season 5 Episode 22 - National Cyber Strategy Supports a More Resilient Water System 39:25

1 Season 5 Episode 21 - The Cybersecurity Talent Gap Peak Challenge for the Government 16:16

1 Season 5 Episode 20 - How Government is Balancing Data Access and Security 17:23

1 Season 5 Episode 19 - US Digital Corps is Bringing Cybersecurity Innovation to Government 17:59

1 Season 5 Episode 18 - JCDC Strengthens U.S. Cyber Posture Through Global Partnerships 36:04

1 Season 5 Episode 17 - A Look Inside VA’s ‘Zero Trust First’ Cybersecurity Approach 22:23

1 Season 5 Episode 16 - The Intelligence Community Cites Tech Changes, Challenges in Framework 26:13

1 Season 5 Episode 15 - The White House Wants to Fix the Cybersecurity Workforce 27:49

1 Season 5 Episode 14 - GovFocus Preview: Zero Trust Enabling the Future Joint Force 7:20

1 Season 5 Episode 13 - Where the White House Wants Agencies to Prioritize Cybersecurity Investments 13:55

1 Season 5 Episode 12 - AI, Machine Learning Play a Critical Role in Enhancing NOAA's Overall Mission 37:07

1 Season 5 Episode 11 - How Security Fits into VA’s Modernized Cloud Journey 29:34

1 Season 5 Episode 10 - Marine Corps is Building a Unified Network to Operate in Highly Distributed Environments 41:55

1 Season 5 Episode 9 - Army is Accelerating Zero Trust Adoption with a New Office 23:45

1 Live from AFCEA TechNet Cyber: How the Pentagon Plans to Fill 30,000 Open Cyber Positions 21:52

1 Live from AFCEA TechNet Cyber: JADC2 Informs Cloud, Cyber Initiatives at Pentagon 14:35

1 Live from AFCEA TechNet Cyber: The Role of Software in the Future Defense Mission 32:00

1 Live from AFCEA TechNet Cyber: Army Cyber Command Tackles Emerging Trends, Cyber Workforce 13:33

1 Season 5 Episode 8 - Lessons Learned from the Thunderdome Zero Trust Pilot 32:51

1 Season 5 Episode 7 - The 6 Core Principles Vital to Building a Robust Culture of Cyber Readiness 40:07

1 Season 5 Episode 6 - VA CISO Outlines Cybersecurity Strategy 30:03

1 Season 5 Episode 5 - Federal Tech Leaders Call for Increased Cyber Urgency 26:45

1 Open-Source Software a National Security Priority 21:13

1 Season 5 Episode 4 - NSA and CISA Assess Potential Threats to 5G 33:09

1 AFCEA West Talks: Coast Guard CIO Eyes Own Take on JADC2, Software Factory 20:09

1 Season 5 Episode 3 - Cyber Defenders, Assemble! New Initiatives Address Cyber Risk 27:26

1 Season 5 Episode 2 - Coast Guard to Launch Software Factory for Better Cybersecurity 39:38

1 Season 5 Episode 1 - The Year Ahead in Federal Cybersecurity 47:56

1 Season 4 Episode 18 - This DOD Program Makes Resilient Systems With the Help of White Hat Researchers Around the Globe 23:41

1 Season 4 Episode 17 - Intelligence Community Needs Industry Partnerships for Robust Cybersecurity 29:01

1 Season 4 Episode 16 - Guide to GSA’s New Privileged Identity Playbook 26:09

1 Ransomware Miniseries: Resisting Triple Extortion with Public-Private Partnerships 27:09

1 Season 4 Episode 15 - Zero Trust is Fundamental to Securing Mobile Applications 26:29

1 Live from AUSA: Army Deputy Chief of Staff Says Service to Significantly Scale Up Bring Your Own Device Program 11:16

1 Season 4 Episode 14 - The Pentagon's Cloud Strategies for Enhanced Security 40:31

1 Flywheel Fridays - A CyberScape Double Album 14:06

1 Season 4 Episode 13 - This Center is Helping ICE Tackle Rapid Increases in Cyber Threats 13:52

1 Flywheel Fridays - What You Need to Know About Zero Trust 16:05

1 Live from Billington Cybersecurity Summit: What to Expect from CMMC 2.0 14:59

1 Season 4 Episode 12 - The Key to Getting More Women Into Cyber Roles 34:30

1 Ransomware Miniseries: DOL Increasing Security for Retirement Plans, Benefits 28:45

1 Season 4 Episode 11 - DOD’s Key Infrastructure Concept Helping to Secure 5G 37:36

1 Ransomware Miniseries: Inside FBI's Tactics to Disrupt Ransomware Attempts 34:12

1 Season 4 Episode 10 - Cyber Training a Key Priority for CENTCOM's Contributions to JADC2 34:35

1 Ransomware Miniseries: FDA Combats New Cyber Threats Across Health Care Environment 25:06

1 Season 4 Episode 9 - DOD’s Portfolio Management Office Accelerates Adoption of Zero Trust 13:33

1 Live From RSA: How to Develop SBOMs For Your Security Strategy 23:10

1 Ransomware Miniseries: How DOD Fights Cyber Crime 11:51

1 Season 4 Episode 8 - Army Software Factory's Strategy for Zero Trust at DOD 17:57

1 Flywheel Fridays - Cloud Modernization Event Recap 14:00

1 Live From SOFIC: Three USSOCOM Fixed Wing Modernization Priorities 9:28

1 Live from SOFIC: How SOCOM Will Use Commercial Cloud for Network Modernization 16:28

1 Flywheel Fridays - AFCEA TechNet Cyber 2022 Recap 17:03

1 Season 4 Episode 7 - BESPIN Software Factory Tips For Secure Mobile App Development 36:48

1 Season 4 Episode 6 - How Chaos Engineering Transforms Cybersecurity for the Air Force 27:08

1 Season 4 Episode 5 - How the Cyber Backbone of the Air Force Contributes to JADC2 38:06

1 Season 4 Episode 4 - Navy IDs Security Risks Ahead of 5G Implementation 19:10

1 Season 4 Episode 3 - How the Air Force Launched Cyber Outreach for Small Businesses 22:02

1 Season 4 Episode 2 - DARPA's Road to Quantum Computing 18:01

1 Live from HIMSS - Penn Medicine Tech Leads Tackle Cybersecurity Challenges and Diversifying the Workforce 22:27

1 Flywheel Fridays - CyberScape ID Event Recap 15:47

1 Season 4 Episode 1 - A Conversation About the Future of Federal Cybersecurity 32:40

1 Season 3 Episode 25 - What Cyber Veteran Shane Barney Learned About Cybersecurity 24:03

1 Season 3 Episode 24 - AI's Role in National Security 7:58

1 Season 3 Episode 23 - How NIST is Helping to Secure 5G Infrastructure 21:33

1 Season 3 Episode 22 - Zeroing in on Zero Trust: HHS OIG's Plan to Boost Cybersecurity 21:28

1 Season 3 Episode 21 - How FEMA's Security Strategy is Embracing Zero Trust 22:10

1 Season 3 Episode 20: Tactics in Mission-Critical Cybersecurity 25:09

1 Season 3 Episode 19 - Tackling the Federal Cyber Workforce Shortage 14:35

1 Season 3 Episode 18 - How CISA's COVID-19 Task Force Protected Hospitals and the Vaccine Supply Chain 47:26

1 Season 3 Episode 17 - Protecting Health Data and Hospital Networks Post-COVID 29:42

1 Season 3 Episode 16 - Improving Federal Cybersecurity One GAO Report At A Time 34:39

1 Season 3 Episode 15 - Transforming Cybersecurity at the Air Force 20:11

1 Season 3 Episode 14: Securing Medical Devices and the Software Supply Chain 24:48

1 Season 3 Episode 13 - Overhauling IT Supply Chains to Secure Federal Agencies 22:23

1 Season 3 Episode 12 - What IT Contractors Should Expect From New CMMC Requirements 34:49

1 Season 3 Episode 11 - GMU Researchers Help DHS Fight Cybercrime 33:38

1 Season 3 Episode 10 - Supercharging Cybersecurity From the Top Down 31:35

1 Season 3 Episode 9 - How the CDM Program Got Started, and How It's Going 26:47

1 Season 3 Episode 8 - 5 Things We Learned About Cloud Security 7:51

1 Season 3 Episode 7 - Supply Chain Security With Atlantic Council's Trey Herr 35:31

1 Season 3 Episode 6 - Securing the Supply Chain Takes Coordinated Effort 12:18

1 Season 3 Episode 5 - Ron Ross, Fellow, NIST 29:05

1 Season 3 Episode 4 - Leaders Explore the Human Element in Cybersecurity 23:26

1 Season 3 Episode 3 - Advancing Mobile App Certification with Automation 22:15

1 Season 3 Episode 2 - National Urban Security Technology Laboratory Director Alice Hong 29:24

1 Season 3 Episode 1 - Adrian Monza, USCIS Deputy CISO and Chief Cybersecurity Architect 40:23

1 Season 2 Episode 9 - HHS CISO Janet Vogel and Deputy CISO Chris Bollerer 29:36

1 Season 2 Episode 8 - DHS CISA's Daniel Kroese and Marsh's Stephen Vina 37:29

1 Season 2 Episode 7 - Oki Mek, Senior Advisor to CIO, HHS 27:12

1 Season 2 Episode 6 - Congressman Gerry Connolly, U.S. House of Representatives 17:48

1 Season 2 Episode 5 - Stacie Alboum, Deputy Director, NIH Center for Information Technology 32:14

1 Season 2 Episode 4 - Servio Medina, Chief of Cybersecurity Oversight, Governance, & Strategy, DHA 47:41

1 Season 2 Episode 3 - Paul Cunningham, CISO, Veterans Affairs 33:29

1 Season 2 Episode 2 - Manuel Castillo, Senior IT Security Advisor, FBI 22:17

1 Season 2 Episode 1 - John Zangardi, CIO, Department of Homeland Security 36:47

1 Episode 6 - Grant Schneider, U.S. Chief Information Security Officer 37:02

1 Episode 5 - Karen Evans, Assistant Secretary for Cybersecurity, Department of Energy 38:08

1 Episode 4 - Ellen Nakashima, National Security Reporter, Washington Post 35:08

1 Episode 3 - Jim Miller, Former Under Secretary of Defense for Policy 38:17

1 Episode 2 - Dave McCurdy, President & CEO of the American Gas Association 49:53

1 Episode 1 - Department of Homeland Security Undersecretary Chris Krebs 34:08
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.