News and insight on today’s mission-critical IT challenges, from the MeriTV studio.
What Happened This Week – Ep. 50
Jan 21, 2022

The FITARA Scorecard is out; a new memo applies the cyber EO to DoD, intel agencies; and more.


What Happened This Week – Ep. 49
Jan 14, 2022

CISA renews call for SBOMs following Log4j, House committee debates FISMA reforms, and more.


What Happened This Week – Ep. 48
Jan 7, 2022

Agencies mitigate Log4j, DHS restarts Hack DHS, telecom delays 5G rollout, and more.


What Happened This Week – Ep. 47
Dec 22, 2021

In this special episode, we look back at 2021 and ahead to 2022. Happy holidays!


Visibility is the Foundation for Zero Trust
Dec 21, 2021

Agencies can’t secure what they can’t see. CISA’s Sean Connelly and Gigamon’s Michael Dickman examine how to achieve persistent visibility. […]

What Happened This Week – Ep. 46
Dec 17, 2021

New CX EO, NDAA passage, the log4j vulnerability, MeriTalk’s TMF Forward event, and more.


What Happened This Week – Ep. 45
Dec 10, 2021

House passes NDAA, OMB issues FISMA guidance, NIST releases IoT guidance, and more.


What Happened This Week – Ep. 44
Dec 3, 2021

The JADC2 implementation plan, potential DoD contractor cybersecurity incentives, and more.


Enabling JADC2 With DoD Enterprise Cloud
Nov 30, 2021

DISA’s John Hale and GDIT’s Jim Matney discuss how data-centric architecture and enterprise cloud will help make JADC2 a reality. […]

What Happened This Week – Ep. 43
Nov 19, 2021

Biden admin outlines PMA vision; CISA issues playbooks; GSA’s TTS picks 14 new projects; and more.


Shift Left & Right for Web App Security
Nov 16, 2021

Two in five breaches originate in a web app. No one is immune, especially as organizations of all sizes build custom apps. Invicti’s Laura Paine tells why shifting security left – and right – is essential to shoring up web security. […]

What Happened This Week – Ep. 42
Nov 12, 2021

Infrastructure bill includes $2B for cyber, DoD simplifies CMMC requirements, and more.


What Happened This Week – Ep. 41
Nov 5, 2021

A new CISA directive, DISA’s reorg, the VA’s EHR, U.S. telecom protections, and more.


What Happened This Week – Ep. 40
Oct 29, 2021

2021 Federal Data Strategy action plan released, House passes bill to protect U.S. telecom, and more.


Cyber Central: Defenders Unite – The Final Word with Matthew Cornelius
Oct 28, 2021

Matthew Cornelius, Senate Homeland Security, shares insights about legislative efforts to reform FISMA.


What Happened This Week – Ep. 39
Oct 22, 2021

Senate FY2022 bills increase CISA, DISA funding; TMF awards $187M to; and more.


What Happened This Week – Ep. 38
Oct 15, 2021

Governments account for 48% of cyberattacks, CISA releases TIC 3.0 Remote Use Case, and more.


What Happened This Week – Ep. 37
Oct 8, 2021

Senate legislation proposes FISMA updates, Feds focus on increasing women in tech, and more.


Cybersecurity Is a Team Sport
Oct 6, 2021

Fortinet’s Jim Richberg, who spent more than 30 years driving innovation in Federal cyber intelligence, tells what it will take for government and industry to cover the other’s cyber blind side, and how a platform approach to cybersecurity can level the playing field against bad actors. […]

Rooting Out Ransomware
Oct 4, 2021

The threat of ransomware has government agencies and critical infrastructure providers on high alert. Recorded Future senior security analyst Allan Liska explains how network awareness, threat hunting, and automation help agencies fight back.


What Happened This Week – Ep. 36
Oct 1, 2021

TMF board awards $311M for 7 new projects, CISA releases IPv6 guidelines, and more.


What Happened This Week – Ep. 35
Sep 24, 2021

US, UK, and Australia form security partnership, CMMC review expected in late 2021, and more.


What Happened This Week – Ep. 34
Sep 17, 2021

MerITocracy survey finds Fed IT spending worth the investment; USDS, DoL overhauling UI; and more.


Identity Is the Core of Zero Trust
Sep 14, 2021

Richard Bird, an internationally recognized security expert with Ping Identity, explains why zero trust is dependent upon identity-centric security and tells how agencies can build upon existing security programs to get to zero trust. […]