b'HHow is your agency managing and securing edge devices (i.e., smartphones, tablets, hotspots, laptops and IoT)?Puckett: A lot of the challenge of securing edge devices, not only from an identity perspective but also from a secure configuration perspective, is how weve been doing it for many years;typically well locked down, least-privileged access, numerous components monitoring the different configuration of systems and endpoints, applying group policies in the way that we have secured devices, and then a hyper awareness in monitoring all ingress and egress of network traffic, whether thats user traffic, data traffic, or management traffic.The challenge is that its typically addressed in a point-in-time fashion. What were leaning into now is true continuous monitoring, not whether we have a given configuration. Were starting to employ tactics that make it an environment and a capability that can fix itself. Typically, when we talk about continuous monitoring, its only monitoring. What it needs to becomeand what we are doing today in a few places although not where we needis continuous remediation. That pivot is towards DevSecOps. We can demonstrate the ability to conduct the mission and When it comes to cloudcontinuously remediate back to a known good state when and edge computing,it comes to how our edge devices and capabilities are built, configured, monitored, and secured today.the DOD learned quiteThe way we conduct mission edge devices and where a while back that youtheyre deployed today are typically untrusted physical environments. Theres not a massive pivot there. The pivot dont build the systemsis when edge devices of government furnished equipment have to connect, not to my office and the Pentagon, and then secure them.but to my home Internet. It changes the threat vectors. Sometimes not everyone gets government furnished That doesnt work well.equipment, yet they still have to conduct their job.From the start, security[COVID] drove home the realization that this distributed has to be paramount inand untrusted endpoint architecture is already the new reality. Before it was seen as this very small subset of all the programs.users. Now its the predominant driver of our users. It only helped accelerate the realization and the need to lean in, - Jody Little not only as something else that we have to address, but also as something that can actually be transformational for how I conduct the mission, how I secure my ecosystem, and how I can expand contributors into that ecosystem. Hiring practices across the DOD are seeing this new world of defacto remote telework users on personal devices. I can hire talent that doesnt necessarily sit close to a camp, post, or station of the United Securing the Nations Network|Page 6'