A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
1
DIBCAC Assessments: Lessons from Belcan's Chief Security and Data Officer, Matt King
28:46
28:46
Na później
Na później
Listy
Polub
Polubione
28:46
Long Description: In this episode, Max is joined by Matt King, Chief Security and Data Officer at Belcan. Matt shares his story of transitioning from Anthem to Belcan, where he has been instrumental in building a security program to meet the stringent requirements of federal compliance. The conversation dives into the DIBCAC assessment process, the…
…
continue reading
1
FedRAMP Equivalency Memo with GRC Analyst, Michael Rasmussen
27:21
27:21
Na później
Na później
Listy
Polub
Polubione
27:21
Max Aulakh and Michael Rasmussen, GRC analyst and CEO of GRC Report, discuss the recent FedRAMP Equivalency Memo released by the DoD in January 2024. They go into depth about the memo, what is involved, the requirements, as well as how this directly effects the CSP. Topics we discuss: What is FedRAMP, and who is it for? How long has FedRAMP been ar…
…
continue reading
1
Use of Artificial Intelligence for NIST Controls Responses - Perspective from Air Force ISSM
28:22
28:22
Na później
Na później
Listy
Polub
Polubione
28:22
Max Aulakh and Uliya Sparks, an ISSM at SAF Mission Partners Environment, discuss the potential of AI in federal compliance. They explore ISSMs' challenges, including managing multiple systems and navigating complex policies like NIST and FedRAMP. Uliya highlights the slow adoption of AI due to concerns about data sensitivity and job displacement, …
…
continue reading
In this episode, Max discusses the fundamental concepts of Control Inheritance and System Reciprocity, highlighting their differences, applications, and importance in the realms of cybersecurity and organizational governance. This topic ties in closely with his recent LinkedIn post about the need for a credit system for security work being done wit…
…
continue reading
1
Enclaves in the Era of CMMC with Reuben Patton
34:17
34:17
Na później
Na później
Listy
Polub
Polubione
34:17
Max Aulakh invites Reuben Patton to discuss the implementation of enclaves in the context of CMMC (Cybersecurity Maturity Model Certification). Reuben, with his experience in both the classified sector and cybersecurity, provides insights on how enclaves, traditionally used in classified environments, are now being applied to manage CMMC requiremen…
…
continue reading
1
The Role of a Chief Legal Officer with Steven Dimirsky
34:03
34:03
Na później
Na później
Listy
Polub
Polubione
34:03
The podcast features Steve Demersky, the Chief Compliance Officer and Chief Legal Officer at 1010 Data. He discusses the importance of legal and compliance officers in the cybersecurity and risk management field. Data privacy is a major concern for SaaS companies, and they need to ensure they are handling client data safely and in compliance with r…
…
continue reading
1
Max Discusses Authorization Boundaries with Naveed Mirza from Okta
37:08
37:08
Na później
Na później
Listy
Polub
Polubione
37:08
Our guest today is Naveed Mirza, Senior Solutions Arcitect at Okta. This episode focuses on the importance of authorization boundaries and how to not only understand them but how to develop them. Naveed shares his background as a government contractor supporting the U S Marine Corps, highlighting the transferable skills and experiences that have pr…
…
continue reading
1
CMMC and DIBCAC Audit Journey w/Anthony Fisic (CISO) from Battelle
34:26
34:26
Na później
Na później
Listy
Polub
Polubione
34:26
Our guest today is Anthony Fisic, Chief Information Security Officer at Battelle, who conducts research and development, designs and manufactures products, and delivers critical services for government and commercial customers. This podcast episode focuses on federal compliance's impact on defense industry businesses. Anthony shares his background …
…
continue reading
1
DCSA Authorization Official - Alex Hubert - ATO in a Day - Is it real?
32:17
32:17
Na później
Na później
Listy
Polub
Polubione
32:17
Alexander Hubert talks about his journey to becoming an authorization official in the public sector. He explains how he transitioned from being a weatherman in the Air Force to becoming an IT guy and then delves into his interest in cybersecurity. Alex shares that he has worked various positions within the risk management framework, including infor…
…
continue reading
1
Public Sector Compliance Terminology 101
28:03
28:03
Na później
Na później
Listy
Polub
Polubione
28:03
Welcome to the first episode of the Reckless Compliance podcast, brought to you by Ignyte, In this episode, Max gives a high-level overview of the different key compliance terminology that will be discussed on the podcast. He provides context, definitions, and use cases. Topics we discuss: Private Sector Defense Industrial Base Cloud Service Provid…
…
continue reading
1
Welcome to Reckless Compliance - Meet Your Host Max Aulakh
8:33
8:33
Na później
Na później
Listy
Polub
Polubione
8:33
Welcome to episode zero of the Reckless Compliance Podcast, brought to you by Ignyte Assurance Platform, where we discover the unintended consequences of compliance. I am your host, Max Aulakh. In this inaugural episode, we cover the following topics: Overview of topics that will be covered in the podcast Overview of the goals of the podcast Max’s …
…
continue reading
1
Anthropics Responsible AI Scaling Policy
47:26
47:26
Na później
Na później
Listy
Polub
Polubione
47:26
In this episode of the Emerging Cyber Risk podcast, Joel and Max explore Anthropic's responsible AI scaling policy. They discuss the practicality and strategic nature of the framework, which aims to ensure the safety of AI models as they push the boundaries of capabilities. They highlight the commitments made by Anthropic and the public disclosure …
…
continue reading
1
Joel's Book Review (Secure Intelligent Machines)
35:04
35:04
Na później
Na później
Listy
Polub
Polubione
35:04
On this episode of the Emerging Cyber Risk podcast, we Joel's latest book, "Secure Intelligent Machines". The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. This podcast epis…
…
continue reading
On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. W…
…
continue reading
1
2024 Annual Planning for AI Enablement
32:43
32:43
Na później
Na później
Listy
Polub
Polubione
32:43
On this episode of the Emerging Cyber Risk podcast, we discuss the AI planning that is going into 2024 and how this may affect our business. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulak…
…
continue reading
1
The Intersection of AI and the Military: A Discussion with Taylor Johnston, Former Chief of Innovation for the U.S. Air Force
31:39
31:39
Na później
Na później
Listy
Polub
Polubione
31:39
On this episode of the Emerging Cyber Risk podcast, our guest is Taylor Johnston, Chief Operations Officer at the USF Institute of Applied Engineering and former Chief of Innovation for the United States Air Force. Join us as we investigate the integration of artificial intelligence and automation into the air force and the wider military. Tune in …
…
continue reading
1
The Biden Administration Hands the Safety & Security of AI to Industry Leaders!
35:04
35:04
Na później
Na później
Listy
Polub
Polubione
35:04
On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. W…
…
continue reading
1
Navigating the Legal Challenges of Artificial Intelligence with Scott Koller of Baker & Hostetler LLP
38:31
38:31
Na później
Na później
Listy
Polub
Polubione
38:31
On this episode of the Emerging Cyber Risk podcast, our guest is Scott Koller, a skilled privacy and data security attorney and Partner at Baker & Hostetler LLP. Join us as we navigate the legal challenges posed by artificial intelligence (AI), delving into the associated risks and possible future solutions. We further explore the ownership and cop…
…
continue reading
1
Exploring the Adoption of AI in the Defense Industry with Ron Fehlen of L3Harris Technologies
35:42
35:42
Na później
Na później
Listy
Polub
Polubione
35:42
On this episode of the Emerging Cyber Risk podcast, our guest is Ron Fehlen, VP and GM of USAF Programs and Broadband Communication Systems at L3Harris Technologies, the trusted disruptor for the global aerospace and defense industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to h…
…
continue reading
1
Exploring the Intersection of Cyber Security and AI: Insights from Phil Harris of IDC
37:41
37:41
Na później
Na później
Listy
Polub
Polubione
37:41
On this episode of the Emerging Cyber Risk podcast, our guest is Phil Harris, Research Director, Cyber Security Risk Management Services at IDC, the premier global marketing intelligence platform. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk managemen…
…
continue reading
1
Transparency and Collaboration: Driving AI Adoption in the Military and Government with Aaron McCray of the US Navy
44:14
44:14
Na później
Na później
Listy
Polub
Polubione
44:14
On this episode of the Emerging Cyber Risk podcast, our guest is Aaron McCray, a twenty-six-year veteran of the U.S. Navy. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. …
…
continue reading
1
Leveraging AI for Risk Management: Insights from Laura Whitt Winyard, VP of Security and IT at Hummingbird
30:13
30:13
Na później
Na później
Listy
Polub
Polubione
30:13
On this episode of the Emerging Cyber Risk podcast, our guest is Laura Whitt Winyard, VP of Security and IT at Hummingbird. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts.…
…
continue reading
1
Navigating the Intersection of AI and Healthcare with Christopher Rogers
47:55
47:55
Na później
Na później
Listy
Polub
Polubione
47:55
Today's guest is Christopher Rogers, COO at Carenet Health. In this episode, we discuss how healthcare companies and consumers should navigate the intersection of AI and healthcare. We cover multiple touchpoints, including AI's potential benefits and pitfalls in healthcare and the importance of using it responsibly. We also examine the need for col…
…
continue reading
1
Incorporating AI in Risk Management: Challenges and Potential Benefits with Jeff Lowder, Co-Founder of The Society of Information Risk Analysts
41:53
41:53
Na później
Na później
Listy
Polub
Polubione
41:53
Today's guest is Jeff Lowder, the Co-Founder and Past President of The Society of Information Risk Analysts, a society dedicated to continually improving the practice of information risk analysis. Our discussion today focuses on the emerging cyber risks and ethical concerns associated with AI in enterprise risk management, highlighting the challeng…
…
continue reading
1
Challenges in Developing, Democratizing, and Adopting AI with Dr. Amit Shah, Founder and President of GNS-AI LLC
38:57
38:57
Na później
Na później
Listy
Polub
Polubione
38:57
Today's guest is Dr. Amit Shah, Founder and President of GNA-AI LLC, a data science/ML/AI consulting business specializing in building data-based decision support systems. Our discussion focuses on the challenges in developing and adopting AI solutions, unifying democratized models, and the challenge of developing FDA-compliant models for the healt…
…
continue reading
1
Managing Cyber Security Challenges in the Retail Space with Ganjar Imansantosa, VP and CISO at Tropical Smoothie Cafe
39:50
39:50
Na później
Na później
Listy
Polub
Polubione
39:50
Today's guest is Ganjar Imansantosa, VP and CISO at Tropical Smoothie Cafe, a nationally franchised quick-service restaurant.We discuss the challenges and solutions of implementing cybersecurity protocols in a shared risk environment between the brand and the franchisee. Ganjar covers multiple touchpoints, including managing cyber security in a sha…
…
continue reading
1
Opportunities and Challenges of AI in Cybersecurity with Phil Agcaoili, Entrepreneur and Former CISO at Elavon, Cox, and VeriSign
43:15
43:15
Na później
Na później
Listy
Polub
Polubione
43:15
Our guest today is Phil Agcaoili, who is a recent Entrepreneur and a former Chief Information Security Officer at Dell. Together, we discuss the impact of AI on cybersecurity, compliance, and the workforce. Phil shares valuable insights on aligning emerging risks with technological advancements with protection software. Phil is an expert in cyberse…
…
continue reading
1
Emerging Cyber Risks and Zero Trust with Paul Miller, Zero Trust Architecture Expert at Appian Logic
38:33
38:33
Na później
Na później
Listy
Polub
Polubione
38:33
Our guest today is Paul Miller, Zero Trust Architecture Expert at Appian Logic, a management consulting and IT security company. They unpack zero trust and ZTNA as a security shield, formulation of a national cybersecurity document, driving awareness and change at companies, and the legacy lag at companies that prevent the adoption of zero trust ar…
…
continue reading
1
The Need to Bring Cybersecurity Front and Center in the Healthcare Industry with Bill Scandrett, Chief Information Security Officer at Allina Health
20:36
20:36
Na później
Na później
Listy
Polub
Polubione
20:36
Our guest today is Bill Scandrett, Chief Information Security Officer at Allina Health. Our discussion pivots around the awareness and implementation of cybersecurity protocols in the healthcare industry. The discussion focuses on oversight of the FDA on medical devices, best practices in operationalizing GRC, managing third-party risk, and protect…
…
continue reading
1
Episode Zero - An Introduction to the Emerging Cyber Risk Podcast
12:29
12:29
Na później
Na później
Listy
Polub
Polubione
12:29
Welcome to the first episode of the Emerging Cyber Risk podcast, brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts.Autor: Brittany Carr
…
continue reading