AUTHOR ARCHIVES

Jessica Herrera-Flanigan

Jessica Herrera-Flanigan Jessica R. Herrera-Flanigan is a partner at the Monument Policy Group, where she focuses on the issues affecting our nation’s security, technology, commerce, and entertainment markets. Previously, she served as the Staff Director and General Counsel of the House Committee on Homeland Security. She also has served as Senior Counsel at the Computer Crime & Intellectual Property Section, Criminal Division, U.S. Department of Justice, where she led the Section’s cybercrime investigation team. She was a Member of the CSIS Commission on Cyber Security and is a Member of the ABA Standing Committee on Law & National Security. She currently serves as the Fellow for Cybersecurity at the Center for National Policy.
Results 1-10 of 90

Cyber Policy Still Stuck in the ‘90s

October 22, 2014 FROM NEXTGOV arrow A few weeks ago, I wrote about the need to move the cybersecurity dialogue to its next stage and to start to seriously consider what disruptors are sitting out there that could help us do so. I identified four areas ripe for discussion. Policy disruptors Data breaches vs. cybersecurity Cyber...

Do We Need to ‘Disrupt’ the Cybersecurity Status Quo?

September 25, 2014 FROM NEXTGOV arrow Next Wednesday marks the beginning of the 11th annual Cybersecurity Awareness Month. The Department of Homeland Security says the month is designed to “engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cybersecurity and increasing the resiliency of the nation...

Cybersecurity May Be Going the Way of Country Music

April 28, 2014 FROM NEXTGOV arrow Late last year Entertainment Weekly writer Grady Smith compiled the YouTube video Why Country Music Was Awful in 2013, explaining “so much of what's on the radio these days sounds exactly the same!” I’m an old school country music fan (my husband likes to say I’m so old school I...

The Internet of Things Means More Things to Hack

March 14, 2014 FROM NEXTGOV arrow People often ask me if I “stay off the grid” by refusing to participate in online shopping and banking and express surprise when I tell them I don't bother. "Doesn’t it scare you?" they ask. "Aren’t you worried your information will be compromised?” Yes and yes, but staying away from...

Data Breach Epidemic: Why Are We Blaming the Victims?

January 29, 2014 FROM NEXTGOV arrow This week, the Michaels craft store chain became the fourth retailer to step forward and say that hackers had breached its computer systems and may have obtained customer information. The announcement followed those of Target, Neiman Marcus and Easton-Bell Sports, all of whose systems have been compromised in the last...

The Adobe Breach This Week Should Get Your Attention

October 4, 2013 FROM NEXTGOV arrow Yesterday, software company Adobe announced that hackers had penetrated its network, compromising the information of some 2.9 million customers as well as the source code of numerous Adobe products. Adobe's revelation was barely noted in a day crowded with news about the government shutdown and Capitol shooting. Unlike past data...

Fallout from Snowden Leak Should Be Greater Transparency

July 18, 2013 FROM NEXTGOV arrow As the debacle over Edward Snowden’s leak of information about alleged NSA surveillance continues to unfold, numerous cybersecurity lessons have been learned and threats revealed. The most obvious lesson, of course, is that the biggest threat to networks and systems, whether they belong to the government or the private sector,...

Five Critical Cyber Questions for the Next DHS Chief

July 12, 2013 FROM NEXTGOV arrow Homeland Security Secretary Janet Napolitano's announcement today that she plans to leave the department raises interesting questions for what is next for the government's cybersecurity efforts. She, along with recently-departed Deputy Secretary Jane Hall Lute, dedicated a significant amount of resources and time to making cybersecurity a priority for DHS....

The Gaming-Cyber Nexus Feds Should Explore

June 12, 2013 FROM NEXTGOV arrow Walking around E3, the annual video game conference and show being held this week in Los Angeles, is an experience. Innovation at its best on display throughout the LA Convention Center through Thursday. As a gamer, I was thrilled to be at the show and see the new consoles and...

Lessons in Homeland Security

May 28, 2013 The Homeland Security Department lost one of its top voices in early May when Deputy Secretary Jane Holl Lute left the agency after four years. In addition to her homeland security experience, Lute has a history of public service in national security and diplomacy. During her last day on the...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.