Original broadcast 6/4/25
Presented by Carahsoft
At a time when the cybersecurity landscape is growing more complex by the day, the conversations at TechNet Cyber highlight how government and industry leaders are collaborating to meet urgent federal mandates and modernize critical defense capabilities. In this episode of Innovation in Government, recorded on site at TechNet Cyber, host Francis Rose speaks with leading voices from across the federal cyber ecosystem. These experts share how they're leveraging artificial intelligence, automating visibility, preparing for quantum threats, and accelerating Zero Trust deployment—all with a common goal: securing the mission and protecting the warfighter.
Connecting Partners to Cyber Success
Alex Whitworth, Director of Sales at Carahsoft, outlines how Carahsoft empowers government agencies by offering access to a wide range of technology providers and simplifying the acquisition process. He explains how collaboration across industry partners and government customers helps accelerate the deployment of modern cybersecurity tools, particularly in areas like Zero Trust. Carahsoft's aggregation model helps reduce procurement delays and provides agencies with integrated solutions that support complex missions.
Key Takeaways:
-
Carahsoft simplifies procurement through a marketplace model tailored for federal agencies.
-
Integrated vendor relationships speed deployment of cybersecurity capabilities.
-
Supporting Zero Trust requires coordinated collaboration across technology partners.
Looking Over the Horizon with DISA
Steve Wallace, Chief Technology Officer at the Defense Information Systems Agency (DISA), shares how DISA is preparing for the future with a focus on practical AI use cases, network detect and respond (NDR) tools, and the implementation of quantum-resistant cryptography. He notes that emerging technologies are accelerating at a rapid pace, prompting the agency to evaluate what is real, actionable, and applicable to mission outcomes. Wallace highlights the need for interoperability across platforms and stresses the importance of empowering the workforce to embrace innovation.
Key Takeaways:
-
DISA is prioritizing actionable AI and emerging NDR technologies for cyber defense.
-
Quantum-resistant cryptography is being integrated now, not later.
-
Interoperability remains a core challenge across DOD platforms.
Accelerating Modernization for the Mission
James Hanson, Acceleration Team Manager at Adobe, discusses how digital modernization aligns with the DOD’s evolving priorities, including acquisition reform and operational efficiency. He describes Adobe’s work supporting DOD-wide initiatives to eliminate legacy systems, reduce manual workflows, and standardize software acquisition through centralized contract vehicles. These changes, he explains, are enabling a more agile and capable defense enterprise with faster access to emerging technologies and improved public-facing communication platforms.
Key Takeaways:
-
Adobe supports DOD-wide modernization through centralized procurement vehicles.
-
Digital-first operations are reducing costs and improving speed to mission.
-
Adobe’s work with DISA is transforming public-facing platforms in record time.
Operationalizing Zero Trust at Scale
David Voelker, Zero Trust Architecture Lead for the Navy, emphasizes the importance of micro-segmentation and user/entity behavioral analytics in Zero Trust implementation. He highlights how success relies on close partnerships between cybersecurity providers, identity managers, and program leaders. Voelker describes a metrics-driven approach that tracks progress toward FY27 Zero Trust goals and helps identify at-risk programs early. The Navy’s collaborative strategy ensures that Zero Trust is implemented efficiently across networks without disrupting operational capabilities.
Key Takeaways:
-
Micro-segmentation and behavior analytics are critical Zero Trust priorities.
-
Program teams must partner with identity and cybersecurity providers to succeed.
-
Metrics-based tracking enables early identification of implementation gaps.
Securing the Quantum Future
Aaron Faulkner, Co-Founder of TYCHON, outlines the dual challenge and opportunity of quantum computing in cybersecurity. While quantum technology offers new computational power, it also poses a significant threat to legacy encryption standards like RSA. Faulkner explains how agencies must urgently inventory and modernize their cryptographic systems to resist future quantum attacks. He details current efforts, including federal mandates and the integration of post-quantum algorithms published by NIST.
Key Takeaways:
-
Quantum computing threatens traditional encryption protocols.
-
Agencies must build cryptographic inventories and upgrade legacy systems.
-
Post-quantum standards from NIST are already being adopted in federal environments.
Building Cybersecurity into the Corps
Jeff Hurley, Acting Director of IIC4 at the U.S. Marine Corps, explains how the Corps is modernizing its network from "flagpole to fighting hole." He describes a hybrid approach to replacing legacy systems while maintaining operational readiness, and emphasizes that cybersecurity must be integrated from the ground up. Hurley highlights the Marine Corps’ move away from rigid compliance models toward dynamic, real-time monitoring frameworks and expresses concern over inconsistent data standards that could hinder AI adoption.
Key Takeaways:
-
The Marine Corps is rebuilding its network to integrate cyber from the start.
-
New monitoring frameworks are replacing outdated compliance models.
-
Standardizing data is essential to support Zero Trust and AI integration.
Cyber Resilience Starts with Visibility
Tom Kennedy, Vice President at Axonius Federal Systems, stresses that visibility is the foundation of any cyber resilience strategy. He explains how asset inventory is often the first step agencies take to defend against threats and how automation allows them to detect blind spots and remediate issues in real time. Kennedy shares how comprehensive asset data can be turned into actionable insights that not only enhance security but streamline operations across the enterprise.
Key Takeaways:
-
Continuous asset visibility is essential for resilient cybersecurity.
-
Automation helps detect and fix misconfigurations or missing security agents.
-
Asset data enables actionable insights and strengthens defense postures.
Unified Zero Trust at the Edge
Kelly Ahuja, CEO of Versa Networks, explains why Zero Trust is not just a set of components but a dynamic framework that requires consistent enforcement across networks. He discusses how Versa’s single software stack offers networking, firewall, and Zero Trust functions in one platform, enabling consistent policy no matter where a user accesses the network. Ahuja highlights the importance of automation, edge computing, and identity brokering to eliminate blind spots and speed up threat remediation.
Key Takeaways:
-
Versa’s unified platform supports Zero Trust across cloud, WAN, and LAN.
-
Policy enforcement must follow users, not devices.
-
Automation and edge computing enable real-time threat detection and response.
Defining Cyber Survivability
Steve Pitcher, Senior Cyber Survivability Analyst at the Joint Staff, redefines cybersecurity as a matter of mission performance rather than just compliance. He traces the evolution of cyber survivability since 2015 and explains how integrating it into performance requirements from the outset leads to better outcomes. Pitcher praises the services for embracing this mindset organically and calls for better coordination across DOD to refine guidance and capture emerging ideas from across the workforce.
Key Takeaways:
-
Cybersecurity must be integrated as a performance requirement from day one.
-
All services are advancing cyber survivability despite limited top-down mandates.
-
DOD needs better coordination and more inclusive policy development.
AI as a Cyber Co-Pilot
Mac Gupta, Senior Director of Marketing at Rocket Software, describes how artificial intelligence serves as a "co-pilot" in cybersecurity operations—augmenting decision-making, not replacing it. Gupta highlights how AI tools help identify anomalies, accelerate responses, and close visibility gaps, especially in legacy systems like mainframes. He also offers practical recommendations for federal agencies beginning their Zero Trust journey, starting with basics like multi-factor authentication and evolving toward more advanced segmentation and automation strategies.
Key Takeaways:
-
AI augments cybersecurity by spotting patterns and enhancing decision-making.
-
Legacy systems, including mainframes, are often overlooked risk areas.
-
Zero Trust success starts with simple, smart steps like MFA and SSO