Chat with Chet
Understanding CISA BOD 2602 and What It Means for Agencies
Fill out the form to watch the full podcast
About the Webinar
This episode of ‘Chat with Chet’ explores the implications of CISA’s Binding Operational Directive 2602 on cybersecurity, focusing on the importance of managing unsupported edge devices in federal agencies. Guest Colin Dupreay shares insights on asset inventory challenges, active scanning, and proactive security measures. Tune into this episode to learn more about best practices for compliance with BOD 2602.
Meet the Speakers
Chet Hayes
Vertosoft, Chief Technology Officer
For over a quarter of a century, Chet Hayes has been at the forefront of technological innovation, crafting solutions to some of the government’s most daunting challenges. Now, as the Chief Technology Officer at Vertosoft, he’s driving a new era of digital transformation across government agencies through the adoption of emerging technologies.
Before Vertosoft, Chet showcased his prowess at GDIT, a position that saw him merging traditional strategy with cutting-edge digital insights. His leadership at SAIC further solidified his reputation as a tech visionary in technical leadership capacities.
But his journey didn’t start there. Chet’s impressive portfolio also includes strategic roles with industry giants like MarkLogic Corporation, BEA Systems, and Sun Microsystems. Each chapter of his career has been a testament to his ability to not only foresee the technological curve but to apply it in support of the most demanding government missions.
Colin Dupreay
runZero, Federal Solutions Engineer
Colin is a Federal Solutions Engineer at runZero. With almost a decade of experience supporting Public Sector customers, Colin is passionate about protecting and securing our nations networks.
Vertosoft
Established in 2016, Vertosoft has been accelerating the adoption of technology in government with its clear focus on reducing complexity and providing scalable, innovative technology solutions that enable government agencies to deliver smarter, client-centric digital transformations, that are cost-effective and user friendly. Vertosoft’s substantial knowledge of the government acquisition lifecycle gives them a unique advantage of driving awareness and discovering distinct access for our suppliers in its desirable market.
runZero
runZero discovers unknown, rogue, and unmanaged devices across IT, OT, IoT attack surfaces to obtain a complete asset inventory without agents, credentials, APIs, or appliances. Red/Blue/Purple teams leverage runZero for cyber inspections/assessments, SOC IR, threat hunting, insider threat, and continuous monitoring use cases for sensitive and fully Air-Gapped networks.