Quantum, Cyber Cybersecurity Dive Quantum, Cyber Cybersecurity Dive

NIST loses key cyber experts in standards and research

Quoted in the article

The head of the agency’s Computer Security Division and roughly a dozen of his subordinates took the Trump administration’s retirement offers, placing key programs at risk. The departures are raising concerns over NIST’s work on emerging technology issues in quantum computing and artificial intelligence.

Read More
AI Nick Reese AI Nick Reese

George Washington University Professionals Podcast: Insights from a Homeland Security Expert

In this episode of The Professionals Podcast, Amanda and Luke are joined by Nick Reese, co-founder of Frontier Foundry, which is a leading DC area AI company. Drawing from Nick's experience as a former DHS Cyber Policy Analyst and a co-founder of Frontier Foundry, the Nick shares insights into shaping Executive Order 13960 on AI and underscores the importance of bridging the gap between policy and emerging technologies.

Read More
AI Nick Reese AI Nick Reese

Digital Leader Show Podcast: AI Governance, Staying Ahead of the Compliance Curve in 2024

On this episode of The Digital Leader Show we are discussing AI Governance & Staying Ahead of the Compliance Curve in 2024, with the Department of Homeland Security's former Director of Emerging Technology Policy Nick Reese and past FDIC Chief Innovation Officer Sultan Meghji...PLUS, headlines for digital leaders from the world of enterprise technology.

Read More
Emerging Tech Nick Reese Emerging Tech Nick Reese

Structurally Sound Podcast: Staying Ahead of Emerging Technology in Critical Infrastructure

Artificial intelligence, blockchains, quantum computing - complex emerging technologies promise to reshape critical infrastructure in the coming years. We’re joined by Nick Reese, an emerging technology entrepreneur, and Robert Crane, a project manager at IHS, for strategies on embracing new tech while staying one step ahead.

Read More
Cyber Nick Reese Cyber Nick Reese

Social Impacts of Municipal Technology: Surveillance, Accessibility, and Crispy Brussels Sprouts

More times than not, asking the right question is more important than getting an answer. Such is the case with connected communities deployments where municipal technologies purport to have the ability to solve all the right problems. Said another way, the technology vendors are telling municipalities which questions to ask and then answering them. But are those the right questions?

Read More
Cyber Nick Reese Cyber Nick Reese

A Connected Community Toolkit for Municipal Leaders: Important Questions (and Adult Beverages)

Boy, who needs a drink, eh? Critical infrastructure, cyber vulnerabilities, AI, lack of guidance, forget it. Before you reach for something strong to drown your sorrows, let’s kick back for a second with something calming. Coming your way right here, right now, and courtesy of GoTech is a toolkit that our municipal officials and critical infrastructure operators can use to help begin to mitigate risks from connected community architecture deployments.

Read More
Emerging Tech Nick Reese Emerging Tech Nick Reese

CONVERGENCE OF MISSION AND MOMENT: IMAGINING THE EMERGING TECHNOLOGY ANALYST

The Department of Homeland Security (DHS) was born in a different time. One year, two months, and twenty-four days after the attack on the World Trade Center, Pentagon, and United Flight 93, DHS was born. The Homeland Security Act was signed on November 25, 2002, and carried with it fresh and open wounds from the horrifying attack just over a year past.

Read More
Cyber Nick Reese Cyber Nick Reese

ABA Section of Civil Rights & Social Justice webinar: Zero Sum Game? Developing a Winning Approach to Privacy and Security in an Age of Zero Trust

Security and privacy are two sides of the same coin – it’s hard to have one without the other. Yet there can be a tension between them. Strong legal and technological protections, including encryption, are necessary to effectively protect private data and communications. Yet terrorists, smugglers of dangerous weapons and drugs, human traffickers, and perpetrators of child sexual abuse material (CSAM) sometimes use end-to-end encrypted messaging (E2EE) to prevent their crimes from being discovered by law enforcement. Proposed U.S. laws such as the EARN IT Act seek to end E2EE messaging so that law enforcement need not fear criminals "going dark."

Read More