Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Leading Federal Cybersecurity: Lessons from CMS CISO

Veeam
05/08/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Robert Wood managed security for 130 million Americans as CMS CISO, overseeing 50 federal employees and 400+ contractors in an inverted staffing model where most operational work was performed by external organizations with complex subcontracting layers
  • All major incidents during his tenure (SolarWinds, MOVEit, Log4J) occurred outside the agency on agency data, creating the fundamental challenge of managing risk across boundaries he couldn't directly control while facing intense congressional and political pressure
  • Wood built a security data lake using Snowflake and implemented SBOM collection aligned with Executive Order 14028, enabling rapid vulnerability queries across contractor environments during zero-day incidents despite initial industry resistance to the mandate
  • He emphasizes that security leaders must ground their work in organizational mission rather than security perfection, practice translating technical concepts for business stakeholders, and avoid unsustainable patterns driven by anxiety about vulnerabilities
  • The conversation reveals how federal cybersecurity leadership requires navigating complex contractor accountability mechanisms, managing personal resilience during crisis situations, and building coalitions across organizational boundaries to achieve security objectives

The Scale and Complexity of Federal Healthcare Security

Robert Wood, former CISO of the Centers for Medicare and Medicaid Services (CMS), discusses the unique challenges of protecting the nation's largest healthcare payer serving 130 million Americans. The conversation reveals the dramatic shift from leading a small startup security team to overseeing hundreds of personnel responsible for securing critical federal healthcare infrastructure. Wood describes the inverted staffing model common in government agencies, where approximately 50 federal employees oversee more than 400 contractor personnel across security operations, privacy, compliance, and risk management functions. This contractor-heavy structure creates complex supply chain dependencies with multiple layers of subcontracting, where operational work is performed by external organizations using their own tools and infrastructure. The discussion highlights how this dynamic fundamentally differs from private sector security operations and introduces unique accountability challenges when managing risk across boundaries the CISO doesn't directly control.

Managing Major Incidents Across Organizational Boundaries

Wood shares firsthand experiences managing critical incidents including SolarWinds, MOVEit, and Log4J while at CMS, emphasizing that all major incidents occurred outside the agency on agency data or programs. This reality created the fundamental challenge of managing risk without direct control, relying instead on policy, direction, and accountability mechanisms that often proved insufficient. The conversation explores the political pressures and congressional interactions that accompany federal cybersecurity incidents, including the need to provide rapid answers to leadership while coordinating response efforts across multiple contractor organizations. Wood discusses the personal toll of incident response, particularly the dangers of sleep deprivation and the importance of self-care during crisis situations. He emphasizes that technical competence alone is insufficient when navigating the political dynamics with boards, Congress, and senior leadership during high-stakes incidents.

Building Security Data Infrastructure and SBOM Programs

Wood describes a strategic initiative to build a security data lake using Snowflake, expanding beyond traditional telemetry-focused security data collection to incorporate business intelligence data for correlation and analysis. This effort aligned with Executive Order 14028's Software Bill of Materials (SBOM) mandate, which required organizations selling to the government to provide software supply chain transparency. Despite industry complaints about the mandate's utility, Wood explains how SBOM collection proved tremendously valuable during zero-day incidents like MOVEit, enabling rapid queries to determine which contractor environments were using vulnerable components. The initiative represented a shift toward proactive asset management and supply chain visibility in an environment where contractors often couldn't quickly answer basic questions about their technology stacks. This technical infrastructure investment aimed to address the fundamental information gap that made risk management across contractor boundaries so challenging.

Leadership Lessons: Mission Focus and Communication Skills

Reflecting on his career progression, Wood emphasizes the critical importance of grounding security work in the organization's core mission rather than getting swept up in anxiety about vulnerabilities and breaches. He describes how security leaders must prioritize mission enablement over security perfection, recognizing that operational continuity is often the primary organizational mandate. Wood shares advice he gives to emerging security leaders about avoiding unsustainable patterns driven by good intentions, warning that trying to carry the world on your shoulders will eventually bury you. He stresses the value of practicing business communication skills, describing how his wife's coaching on public speaking helped him translate technical concepts for executive stakeholders. Wood recounts an early career experience where he fumbled explaining red team results to a bank executive because he could only provide technical answers, highlighting how the ability to build coalitions and work collaboratively across teams is essential for security effectiveness. The conversation concludes with his core advice: understand your mission, know your stakeholders, and test every initiative against those first principles.

Chapters

0:00 - Introduction and CMS Overview
1:53 - Supply Chain Security Challenges
6:12 - Accountability Mechanisms in Government
8:20 - Becoming CISO: Culture and Technical Leadership
11:45 - Managing Major Incidents: SolarWinds, MOVEit, Log4J
25:36 - Personal Resilience During Crisis
27:35 - Expectations for Contractors and Vendors
32:03 - Building Security Data Lake and SBOM Program
46:56 - Clarity in Roles and Responsibilities
50:44 - Career Advice: Communication and Mission Focus
55:16 - Closing

Key Quotes

1:08 "I went from a job where I was running a small security team for a tech startup to that job where we had hundreds of people covering the biggest health payer in the country."
4:41 "We had about 50 federal employees in the information security and privacy group... and over 400 contractor employees working with us."
11:33 "There's, I want to say, 130 million Americans on those programs, and that's not a small number. It is an enormous responsibility."
12:18 "All of the major incidents that I oversaw in that role happened outside of the agency on agency data or on agency programs. And that was hugely problematic because you're trying to manage risk that you don't control in any way, shape, or form."
33:22 "Having that information handy allows you to go in and query around incidents such as the big CVE, like Move It, for example. Zero day happens, are you using this vulnerable thing? And that's where these programs like asset management and the SBOM collection are tremendously valuable."
48:02 "Security wasn't the most important thing, like data security and all of that stuff. If the programs could continue to function, obviously, there's setbacks to data security and integrity issues and all of that stuff. But that was not the absolute core mission. It was all about operations and mission enablement."
49:39 "It is so common for people to get swept up in the anxiety around we're not secure enough, a breach is imminent, we need to work so hard. And oh my god, there's a vulnerability over here. So my team is going to be the ones to patch it and to take on that work."
50:36 "Eventually, it will just bury you. And then you're no good to anyone. Mission first."

Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Thought Leadership
  • Executive Briefing
  • Compliance & Governance
  • Data Protection
  • Security Operations
  • Interview
  • Federal Cybersecurity Leadership
  • Government Contractor Management
  • Supply Chain Security
  • Incident Response at Scale
  • SBOM and Software Transparency
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Leading Federal Cybersecurity: Lessons from CMS CISO

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Satori Spring: Insights from Recent Research on the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/satori-spring-insights-from-recent-research-on-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version