Finite StateFinite State
Finite StateFinite State
Compliance & Regulations

Does the Government's Cybersecurity Mouth Have Any Teeth in It?

On IoT: The Internet of Threats podcast, we explore cybersecurity regulation and the fine line that NIST walks in effecting change in cybersecurity

Ryan Owen

Ryan Owen

October 14, 2022

What are the cybersecurity goals of the Biden administration? What are the different attestation models that could be used in verifying compliance with current and emerging cybersecurity regulation? How does NIST tow its fine line between effecting change in cybersecurity and overwhelming the resources of security practitioners and compliance personnel?  

On this episode of the IoT: The Internet of Threats podcast, we met with Mariam Baksh, Staff Reporter at Nextgov, a Washington, DC-based publication that reports on federal IT and tech policy through journalism, podcasts, and more. We explored the recent issuance of the OMB's M-22-18, how that memorandum builds on last year's Executive Order 14028, the challenge involved in measuring and evaluating cybersecurity compliance, and the fine line that NIST walks between effecting change in cybersecurity and overwhelming company resources.

On this episode of the podcast, Mariam Baksh joins host Eric Greenwald to discuss:

  • Why the Biden administration issued last year's EO
  • NIST's balancing act between improving cybersecurity and avoiding the imposition of costly requirements on companies 
  • The challenges involved in measuring cybersecurity performance
  • The implications of a first-party vs. third-party attestation model
  • The value of an SBOM and its growing role in cybersecurity regulation
  • Whether the EO or the OMB memo will deliver any enforcement on the requirements they impose

Who determines if a company complies with government regulations? 

11832-LinkedInQuoteGraphic_GovCyberMouth_Quote1_v1-1


How do we measure cybersecurity performance? How do we evaluate compliance with prevailing and emerging regulation? 

When the Biden Administration's Executive Order 14028 was issued last year, discussion quickly turned to whether the self-attestation model would push aside earlier attempts that suggested third-party attestation models were coming.

Check out this podcast episode and hear Mariam Baksh explore an option between first- and third-party attestation, where she looks at the direct-customer review model. In this model, she posits, the government could go in, look at the environment and the artifacts, examine the artifacts, and audit these entities for themselves.   

Why Bother with SBOM?

11832-LinkedInQuoteGraphic_GovCyberMouth_Quote2_v1-1

Can customers look to SBOM as an artifact that offers greater visibility into what's inside a product? Can SBOM help them begin to understand its components?

Listen in to our latest episode of the IoT: The Internet of Threats podcast, and hear Mariam Baksh, Staff Correspondent at Nextgov, explore the value of SBOM and the increasingly important role it plays in cybersecurity regulation.

Episode Details

Mariam Baksh is a staff reporter for Nextgov, a Washington, DC-based publication that reports on federal IT and tech policy through journalism, podcasts, and more. In her role at Nextgov, Mariam reports on the development of federal cybersecurity policy. Mariam has been covering technology governance since 2014 and earned her master's degree in journalism and public affairs from American University.

Episode Links

All episodes of Finite State’s “The Internet of Threats” podcast can be heard on Spotify, Apple Podcasts, and Google Podcasts.

Listen to this episode in its entirety below!

Tags

#regulation
Ryan Owen

Ryan Owen

Ryan is Head of Content Marketing at Finite State, where he leads content strategy across thought leadership, product marketing, and customer education.

Related Articles

Road to Compliance: First Steps OEMs and Suppliers Should Take Today

The Road to Compliance: First Steps OEMs and Suppliers Should Take Today

Learn how to achieve Connected Vehicle Rule compliance with six actionable steps — from SBOM & HBOM generation to supplier engagement and risk evaluat...

Oct 20, 2025
Legacy Software & CVR Compliance Carveouts Explained

Legacy Software & CVR Compliance Carveouts Explained

Learn how legacy carveouts and specific authorizations can help you comply with CVR—while time-limited, they demand proactive planning now.

Oct 16, 2025
Regulations Driving IoT Security Forward

Regulations Driving IoT Security Forward

From EU CRA to FDA 524B, IoT regulations are reshaping the market. Learn what manufacturers need for compliance—SBOMs, testing, and supply chain visib...

Sep 24, 2025

Ready to Level Up Your Security Knowledge?

Join thousands of security professionals learning from the best in the industry

Start Learning TodayStart Learning Today
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & Media
Contact Sales
X

Privacy PolicyTerms of UseCustomer Terms and Conditions