show episodes
 
Compelling tales from the world of public relations, marketing and branding, told by the well-meaning communications professionals who lived them. On Lead Balloon, professional communicators share tales of the do-or-die situations that defined their creative careers—how they planned for the unexpected, how they navigated high-profile crises, and what they learned in the process. With immersive storytelling and a wry sense of humor, host Dusty Weis revisits epic PR disasters, intense communic ...
  continue reading
 
Loading …
show series
 
The Department of Education is kicking off the second phase of its zero trust strategy by focusing on security orchestration and automation response to stay ahead of the evolving threat landscape. Education CISO Steven Hernandez discusses how the agency is tailoring its cyber tools and technologies by automating manual processes and leveraging iden…
  continue reading
 
Sociolinguist Dr. Valerie Fridland says we need to relax about the changing nature of language. In her book, "Like, Literally Dude: Arguing for the Good in Bad English," she notes that language has always evolved. Every generation adds its own spin, and the English language is almost unrecognizable from what was spoken centuries ago. And for the mo…
  continue reading
 
Federal agencies are modernizing their cybersecurity strategies as threats continue to evolve. Faced with the National Cybersecurity Strategy, zero-trust implementation and recruiting a cyber workforce, agencies are primed for a busy 2024 in cyber and IT. Managing Editor Ross Gianfortune and Staff Writer/Researchers Nikki Henderson Whitfield and Jo…
  continue reading
 
When you're working with high-profile people in fields like PR, marketing and branding, things are always changing. History gets uncovered. New information comes to light that changes everything. And sometimes an opportunity comes along to learn just a little bit more about a topic of interest. So in this episode, we're revisiting three separate ta…
  continue reading
 
The White House released its National Cybersecurity Strategy in March and is ending the year with the first permanent National Cyber Director in nearly a year. On CyberCast, we covered it all. Take a listen back to some of the highlighted interviews with federal IT leaders, officials and experts this year as CyberCast traveled to Hawaii, California…
  continue reading
 
This episode we're diving into zero trust at the Defense Department. Specifically, how that is playing out for the Indo-Pacific region. We recently had the opportunity to connect with several leaders at the AFCEA TechNet Indo-Pacific conference in Honolulu where they shared with us how they're thinking about this quickly changing landscape and what…
  continue reading
 
At the end of his first week working in public relations, Lead Balloon host Dusty Weis did something so dumb, he could have been fired on the spot. During a meeting with one of his new bosses, prominent Milwaukee politician Jim Bohl, Dusty made a bad assumption and recklessly insulted Jim to his face. Dusty wasn't fired, and the pair went on to wor…
  continue reading
 
FEMA is developing prototypes for AI use cases in cybersecurity implementation amid a White House artificial intelligence executive order that directs agencies to establish and maintain standards for safety and security of the technology. FEMA CISO Gregory Edwards discusses how the rapid pace of AI innovation is spurring partnerships across federal…
  continue reading
 
The Environmental Protection Agency is honing in on multiple pillars from the National Cybersecurity Strategy to secure critical infrastructure at its water and waste-water operations. The agency deems water security to be national security and is an area that needs critical attention. Efforts are underway to increase cyber awareness in the water s…
  continue reading
 
UFOs have traditionally been more of a pop culture phenomenon than an actual science. But with the recent declassification of Navy gun camera footage that shows unexplained craft seeming to defy the laws of flight and physics, there's a growing movement among the aviation, military and science communities. They insist it's vital to destigmatize the…
  continue reading
 
The U.S. Digital Corps is bringing innovation to government by placing early-career technologists at agencies. Operated by the General Services Administration (GSA) Technology Transformation Services (TTS), the Corps’ fellowship program gives individuals the chance to work on critical issues at the intersection of technology and public service. Dig…
  continue reading
 
Bad actors accessing sensitive government data through vulnerable weak points is an ongoing concern for federal IT officials, who are making securing data a top priority amid digital modernization. Challenges in data security arise when you need to balance it with efficient data access while keeping threat actors out. In this episode, we break down…
  continue reading
 
The U.S. Digital Corps is bringing innovation to agencies through early-career technologists. Operated by the General Services Administration (GSA) Technology Transformation Services (TTS), the Corps’ fellowship program gives individuals the ability to find themselves working on critical issues at the intersection of technology and public service. …
  continue reading
 
Let's be honest: political groups don't have a great success rate when it comes to their strategic communication tactics. Every election cycle, American voters are bombarded with mailers, emails and text messages that mostly just get trashed or deleted. And when a Political Action Committee like NextGen America is charged with reaching out to young…
  continue reading
 
JCDC Partnerships International, which sits within CISA’s cybersecurity division, works with 150 partners worldwide with the goal of sharing and exchanging critical information allowing the U.S. to respond to cyber threats faster, protect the country’s critical infrastructure more effectively and relay that information to its international counterp…
  continue reading
 
The Department of Veterans Affairs is amid a cybersecurity modernization plan to put identity management and zero trust at the forefront of the biggest security threats facing technology teams. Jeff Spaeth, deputy CISO and executive director of information security operations at VA, is a bit of a boomerang. A veteran himself and longstanding cybers…
  continue reading
 
On January 18, 2018, the entire State of Hawaii received an ear piercing alert on their cell phones. "BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL." Those with a keen memory will recall that the Aloha State was NOT, in fact, wiped off the map by a missile strike. It was a false alarm. But what it revealed …
  continue reading
 
In its recently released National Intelligence Strategy, the Office of the Director of National Intelligence outlines the strategic direction for the Intelligence Community (IC) over the next four years. In it, Director of National Intelligence Avril Haines notes the dramatically changing environment in which the IC operates, including the IT envir…
  continue reading
 
The White House recently released it National Cyber Workforce and Education Strategy to enhance and unleash America's cyber talent. The plan addresses the workforce needs in the public and private sectors by introducing cybersecurity concepts throughout all levels of education. The document proposes making advanced occupational training in cyber mo…
  continue reading
 
The robot revolution has arrived. And they're coming for your marketing or content creation job. The advent of generative artificial intelligence chatbots—most notably tools like Chat GPT and Midjourney—is poised to revolutionize creative industries. These tools use deep learning technology to generate new content based on prompts from human users.…
  continue reading
 
Military cyber leaders repeatedly say zero trust is critical, essential and integral to the Defense Department's Joint All-Domain Command-and-Control (JADC2) concept. A zero trust approach to cybersecurity helps organizations improve data security, manage users on the network and facilitate data interoperability, all key components of JADC2. Enjoy …
  continue reading
 
The Office of Management and Budget along with the Office of the National Cyber Director released a memo laying out cybersecurity investment areas that agencies will have to include as they make their budgetary decisions for the next fiscal year. We break down those investment areas, how it ties to the recently released National Cybersecurity Strat…
  continue reading
 
Every professional communicator has had a day that seems like it came straight out of a TV sitcom. For Rob Davis and John R. Montgomery, working at the Chicago ad firm Leo Burnett in the early 2000’s, it was a regular occurrence. In fact, the stories from their time there were so singular, that when they shot a pilot and pitched it to Hollywood, it…
  continue reading
 
Emerging technologies are proving to be very beneficial to the National Oceanic Atmospheric Administration when it comes to climate modeling, behavior analytics and its overall mission. Not only has automation technologies played a key role in NOAA's weather forecasting and environmental monitoring, but also machine learning has been a huge help in…
  continue reading
 
Since 2018, the Department of Veterans Affairs has been on a journey to the cloud to streamline operations, drive down expenses, better protect data and improve business operations. The agency’s Deputy Director of Infrastructure Operations Kendall Krebs explains how VA is looking to not only use cloud to improve the speed and quality of its applica…
  continue reading
 
"How do you do, fellow marketers? We think it would be pretty 'on fleek' if you would stop trying to use slang terms to make yourself more relatable to young people." Certainly, brands swooping in and trying to leverage youth culture to drive sales is nothing new. But as bad as it was in the 80’s, 90’s, and early 2000’s, the advent of social media …
  continue reading
 
The Marine Corps is on track to being one of the most distributed forces ever with significant command, control, communications, intelligence and cyber capabilities. A unified network with modernized network equipment is critical to operating in this environment. Cyber Technology Officer Shery Thomas discusses the Marine Crops’ efforts to combine n…
  continue reading
 
The ultimate goal of the Army’s recently established Zero Trust Functional Management Office is to have a secure unified network that is defended by a fully implemented zero trust framework that will enable multi-domain operations and accomplish the Army’s missions. Col. Michael Smith, director of this office, details next steps for zero trust impl…
  continue reading
 
Communicating during and about the Covid-19 pandemic is a topic we've discussed several times on this show, including in our most recent episode. And, as of today, May 11, 2023, the Department of Health and Human Services coronavirus Public Health Emergency is expiring. But just because Covid is "over" doesn’t mean we won’t still have to discuss it…
  continue reading
 
Loading …

Quick Reference Guide