What Happens After a Security Breach? | GovernmentCIO Media & Research
Deep Dives , Deep Dives

What Happens After a Security Breach?

As agencies stand up zero trust strategies, federal and industry partners are working together on best practices for responding to cyber attacks and ensuring critical data and systems remain secured.

Inside, read insights featuring:

  • Defense Department CISO David McKeown on Congress' new cyber incident reporting mandate

  • CISA's draft model for what to do after a cyber incident

  • Exterro Forensic Subject Matter Expert Justin Tolman on recovering from cyber attacks

  • OMB Acting Director Shalanda Young on the breakdown of the maturity model for federal agencies to track information logs from their IT systems


Thank you for requesting this Deep Dive. If the download did not automatically begin, please check your pop-up blocker and try again.

Exterro Deep Dive
Deep Dive


Technical Director for Cyber, CISA
Managing Director for Security, American Gas Association
Associate Director, Cybersecurity Division, CISA
Deputy Executive Assistant Director of Cybersecurity, CISA
Senior Vice President, Bank Policy Institute

Kate Macri is a staff writer/researcher for GovernmentCIO Media & Research, where she primarily covers the Department of Homeland Security.

Prior to joining the team in June 2020, she covered the video game industry and small businesses for Zenger News. She also covered banking and finance news for Banking Dive, a B2B media publication based in Washington D.C., and reported logistics, supply chain and shipping news for Supply Chain Dive.

If she isn't boxing or walking her boxer, you can find Kate with her nose in a Stephen King novel, slaying monsters in the world of Final Fantasy or waiting for a blue public call box to land in her front yard.

Senior Researcher, GovCIO Media & Research
CISO, Department of Defense
Forensic Subject Matter Expert, Exterro
Executive Director, CISA


Exterro logo