Original Broadcast Date: 1/18/26
Presented by Commvault & Carahsoft
This episode of Fed Gov Today with Francis Rose focuses on how federal agencies are approaching emerging technologies with intention rather than hype. EPA CIO Carter Farmer explains why agencies should not use artificial intelligence to solve every problem. He emphasizes a data-first mindset, urging leaders to clearly define the problem, understand the data involved, and choose the right tool. Farmer describes EPA’s move toward more centralized, collaborative “fusion teams” that bring security, data, and operations together early in projects, helping avoid costly rework and improving long-term outcomes.
The conversation then shifts to data resilience with Richard Breakiron of Commvault. He frames data resilience as an organization-wide responsibility, centered on understanding where data lives, ensuring its quality, and being able to recover critical systems quickly after disruptions or attacks. Breakiron highlights how unified data management and technology overlays can support modernization, zero trust, and AI-driven insights.
Finally, Ed Mays of Customs and Border Protection discusses CBP’s post-quantum cryptography journey. He explains why quantum computing poses a future threat to today’s encryption and outlines CBP’s proactive steps, including proofs of concept and plans to protect high-value systems. Across all segments, the episode reinforces a common theme: thoughtful preparation, strong data foundations, and deliberate technology choices are essential to mission success.
In this segment, EPA Chief Information Officer Carter Farmer cautions federal agencies against using artificial intelligence as a default solution. He stresses that AI is just one tool and should only be used after agencies clearly understand the problem they are trying to solve. Farmer explains that EPA approaches modernization with a data-first mindset, focusing on how data is created, shared, and used across the agency before selecting technology.
He describes the complexity of EPA’s mission, which requires integrating data from many offices and external partners, and notes that poor or inconsistent data limits the value of AI. To address this, EPA is working to better align definitions, improve data quality, and reduce fragmentation across systems. Farmer also outlines organizational changes, including the use of cross-functional “fusion teams” that bring security, data, and operations together from the start of a project. His message is clear: lasting innovation comes from thoughtful planning, strong data foundations, and choosing technology that truly fits the mission.
Key Takeaways:
In this segment, Richard Breakiron of Commvault explains why data resilience has become a top priority for federal agencies. He defines data resilience as knowing where data lives, understanding its quality, and ensuring agencies can quickly recover critical systems after an accident or cyberattack. Breakiron notes that agencies often have data spread across on-premises systems, cloud environments, and internal networks, creating management challenges that go beyond technology alone.
He connects data resilience directly to modernization, describing technology as an essential layer that supports people and processes at scale. Breakiron highlights how unified data management tools can provide visibility across environments and enable more natural, automated interactions with data through AI. He also ties resilience to broader initiatives like zero trust and compliance, arguing these controls can become strategic advantages rather than burdens when built into systems from the start. Ultimately, he emphasizes that resilient, well-managed data is foundational to mission continuity, security, and effective use of emerging technologies.
Key Takeaways:
In this segment, Ed Mays of U.S. Customs and Border Protection discusses why quantum computing and post-quantum cryptography are critical to national security. He explains that many of today’s encryption methods will eventually be vulnerable to quantum computers, which could break widely used cryptographic algorithms far faster than current systems. Because CBP protects high-value systems that support trade, border security, and the U.S. economy, waiting to act is not an option.
Mays outlines CBP’s proactive approach, including an early proof of concept with post-quantum cryptography and plans to protect a high-value application by wrapping it with quantum-resistant controls. He stresses that cryptography is embedded throughout technology stacks, making the transition more complex than simply swapping algorithms. Even though the exact timing and power of quantum threats remain uncertain, Mays says the risk is clear. Preparing now, learning through pilots, and understanding existing systems gives CBP a better chance to defend critical missions in the future.
Key Takeaways: