Jessica Herrera-Flanigan

Jessica Herrera-Flanigan Jessica R. Herrera-Flanigan is a partner at the Monument Policy Group, where she focuses on the issues affecting our nation’s security, technology, commerce, and entertainment markets. Previously, she served as the Staff Director and General Counsel of the House Committee on Homeland Security. She also has served as Senior Counsel at the Computer Crime & Intellectual Property Section, Criminal Division, U.S. Department of Justice, where she led the Section’s cybercrime investigation team. She was a Member of the CSIS Commission on Cyber Security and is a Member of the ABA Standing Committee on Law & National Security. She currently serves as the Fellow for Cybersecurity at the Center for National Policy.
Results 61-70 of 90

Keyboard Fight at the Server Saloon

July 7, 2011 FROM NEXTGOV arrow This week, like most recent weeks, has been a busy one on the cybersecurity front. While the hacking group LulzSec reportedly disbanded last week, members of Anonymous allegedly broke into Apple's computers and members of Script Kiddies allegedly hacked Fox News' Twitter account and sent false messages regarding the President's...

Where Innovation and Cybersecurity Meet

June 15, 2011 FROM NEXTGOV arrow The Commerce Department's Internet Policy Task Force is seeking public comment on its comprehensive review of the nexus between cybersecurity and innovation in the Internet economy, according to a notice published Wednesday in The Federal Register. Specifically, Commerce is requesting comment on a report it released last week called Cybersecurity,...

Is Immigration Good for Cybersecurity?

June 15, 2011 FROM NEXTGOV arrow Representative Zoe Lofgren (D-CA) introduced on Tuesday her widely anticipated high-skilled worker bill, the 2011 Immigration Driving Entrepreneurship in America (IDEA) Act. The Congresswoman said, "it makes no sense for us to educate the world's brightest students and then ship them back to their home countries to compete against us....

Are Hacking Gangs Back?

June 14, 2011 FROM NEXTGOV arrow During the past year, the world has seen the emergence of Anonymous and LulzSec hacking groups. Anonymous, a "hacktivist" group that claims it hacks for its ideals, has attacked the Spanish national police, a Turkish government site, Iran, Sony, PayPal, and Mastercard. Today, the group says it will initiate "operation...

E3: Cybersecurity Hits Gaming, Opportunity Exposed

June 8, 2011 FROM NEXTGOV arrow The Electronic Entertainment Expo (E3), the annual trade show for computer and video games, is underway in Los Angeles. As the show opened, Sony Computer Entertainment America took the opportunity to apologize for the cyberbreach that crippled the Playstation Network during the past several weeks. Meanwhile, Nintendo was also attacked...

Cybersecurity Recommendations

June 1, 2011 FROM NEXTGOV arrow The Center for a New American Security released a two-volume report today on cybersecurity entitled "America's Cyber Future: Security and Prosperity in the Information Age." In the acknowledgments, the authors thank the "more than 200 people who generously contributed their time and expertise to the project." The report has numerous...

Cyber Attention: Why Now?

May 27, 2011 FROM NEXTGOV arrow This week, at least four hearings in Congress tackled cybersecurity issues. The week kicked off with the Senate Homeland Security and Government Affairs Committee hearing, "Protecting Cyberspace: Assessing the White House Proposal." On Wednesday, the House had a trio of hearings, including Judiciary's "Cybersecurity: Innovative Solutions to Challenging Problems," Science,...

Reitinger Leaves Big Shoes to Fill

May 18, 2011 FROM NEXTGOV arrow Various media outlets are reporting that Philip Reitinger, the deputy undersecretary of the Homeland Security Department's National Protection and Programs Directorate, is resigning. National Journal released an email Reitinger sent to DHS employees this afternoon: I have decided that the time has come for me to move on from the...

White House Cyber Proposal: First Impressions

May 12, 2011 FROM NEXTGOV arrow After much anticipation,the White House released its cyber proposal today. It has mostly been kept under wraps (with leaks here and there), despite being vetted through multiple agencies. In releasing the proposal, the White House said, "The proposed legislation is focused on improving cybersecurity for the American people, our Nation's...

SEC - Cyber Enforcer?

May 12, 2011 FROM NEXTGOV arrow A group of Senators, lead by Senate Commerce Committee Chairman Jay Rockefeller, sent a letter Wednesday to the Securities and Exchange Commission advising the agency to construct regulations and guidelines for companies to follow when reporting data breaches and whether intellectual property or trade secrets have been stolen. Also signing...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.