b'millions of Americans. The second most important step is the call for government and private industry to work together, stronger than ever. The innovation, investment and resources from the private sector are essential for government to be successfuland industry relies on the public sector to modernize and safeguard federal systems to empower the rapidly evolving government mission. innovation and resources from private industryId also argue that private industry cant be successful in its mission without the willingness of the government to adapt to technology and modernize legacy platforms. This modernization of legacy platforms really enables government agencies to be better prepared to keep pace with the rapidly evolving government mission. We need to accelerateOwen Rodgers: The Executive Order and the follow-up instructions aregoing to bring a real focus on the network and the capabilities that reside this work between both in and at the edge of the network. AT&T can help by implementing government and controls and supporting the architecture that the Executive Ordermandates One of the critical elements of almost any Zero Trust type of private industry to environment is the segmentation gateway that permits flows betweenallow for collaborativeendpoints on the network, allowing for definition of different segments of the network. When you host that in the core of the network, as opposed to information sharing.at a traditional data center, it improves network efficiency and scalability. I think its incumbent to turn up these capabilities and get to the desired - Owen Rodgers architecture as quickly as possible.In your opinion, and for the sake of our readers, what do you feel is acritically under-discussed aspect of cybersecurity that must behighlighted moving forward? Owen Rodgers: Its worth repeating again the importance of threat detection. Breaches are going to happen. Its a fundamental tenet of Zero Trust. Every system is going to fail if an attacker has enough time, talent and resources. Its a matter of when, not if, youre going to get hit, and once it happens,its important to have the people, processes, and tools to quickly identify the threat, isolate thedevice as an example, clean it, and then assess what needs to be done to prevent that particularvulnerability from being exploited again. Each of these steps is critical, and it starts with anomalydetection and threat hunting. Its easy to talk about the steps but I know how challenging it can be for government to implement. For agencies that dont have the right resources or stock environment to prepare, protect and respond to the ever-increasing threats, there are MDR (managed detection and response services) available that can integrate with existing networks and tools. This is just one example of the innovation and investments from industry that can assist government agencies.Bryant Stewart: Ill double down on my previous remarks about the talent gap. While there is widerecognition that the gap exists, whats under-discussed are the actions being taken to address the issue. In order to have a sound plan, we need to make investments today to increase the talent pool several years from now.I believe robust action is necessary including funding to educate youngergenerations in order to develop a skilled workforce for government cybersecurity jobs. Awareness nationwide is essential to ensure students are not only cyber aware but there also needs to be a focus on building student interest and knowledge about security career paths. The future workforce in cyber is dependent on the actions we take today. Government Business Council Securing the Nations Network | Page 12'