Identity-First Strategy for IT Modernization: Office of the DoD CIO Perspective

Jul 17, 2025 2:00 p.m. ET

As the Department of Defense continues to drive forward its enterprise-wide Identity, Credential, and Access Management (ICAM) strategy, identity federation, auditability and automation are essential components to achieving mission success, reducing risk and meeting compliance goals.

In this webinar, industry leaders will break down how Identity as a Service is helping DoD agencies accelerate secure onboarding, simplify legacy system integration and apply advanced tools like Attribute-Based Access Control and AI to strengthen identity governance.

Register Now

Accelerate together: Zero trust

Are you ready to accelerate zero trust at your agency?

“You have to be able to scale across hundreds of teams, thousands of workloads,” says AWS Principal Technologist Sean Phuphanich, when discussing how to make a zero trust architecture the foundation for modernization. “That’s really where a lot of the stumbling blocks come into play because then you’re dealing with a lot of different teams, different environments, different tools.”

Read Full Publication

Johnson Controls starts notifying people affected by 2023 breach

Building automation giant Johnson Controls is notifying individuals whose data was stolen in a massive ransomware attack that impacted the company’s operations worldwide in September 2023.

Johnson Controls is a multinational conglomerate that develops and manufactures industrial control systems, security equipment, HVAC systems, and fire safety equipment for buildings. The company employs over 100,000 people through its corporate operations and subsidiaries across 150 countries, reporting sales of $27.4 billion in 2024.

Read Full Article

Cloud Exchange 2025

As agencies expand the depth and breadth of their cloud use, civilian and defense IT teams are focused on managing cloud services as an integrated part of their full enterprise infrastructure. 

It just makes sense given that government agencies are implementing more cloud-native technologies, piloting and scaling the latest artificial intelligence capabilities, facing increased cybersecurity demands and seeking to leverage data quickly – and at the edge.

Jun 17, 2025 to Jun 18, 2025

Webinar

Register Now

TSA seeks OMB approval to extend pipeline security and cyber incident reporting requirements

The U.S. Department of Homeland Security issued a 30-day notice that the Transportation Security Administration (TSA) has submitted an Information Collection Request (ICR) to the Office of Management and Budget (OMB) for review and approval. The request seeks to extend the current data collection related to pipeline security incidents, apart from the contact details of designated cybersecurity coordinators and their alternates.

Read Full Article

A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls

The rapid advancement of technology and increasing data utilisation have underscored the need for new models to manage and secure big data effectively. However, the constraints of isolated network environments and the limitations of existing security frameworks hinder the adoption of cutting-edge technologies such as AI and cloud computing, as well as the safe utilisation of data. 

Read Full Publication

US House Approves Bill to Assess Security Threats Posed by Foreign-Made Routers

A new bill requiring the US Commerce Department to assess the national security risks associated with routers and modems controlled by adversarial nations is one step closer to becoming law after passing the House of Representatives.

The House passed the Removing Our Unsecure Technologies to Ensure Reliability and Security (ROUTERS) Act on April 28, advancing the legislation after it was cleared by the House Energy and Commerce Committee three weeks earlier.

Read Full Article