![Security worker wearing glasses and looking at a computer monitor, surrounded by an overlay of code and charts.](https://www.microsoft.com/en-us/industry/microsoft-in-business/wp-content/uploads/sites/28/2022/01/cyber_eo_heroimg_800x602-300x226.webp)
Steve Faehl articles
![Steve Faehl Headshot](https://www.microsoft.com/en-us/industry/microsoft-in-business/wp-content/uploads/sites/28/2021/08/Steve-Faehl-Headshot-250x250.jpg)
Steve Faehl
Microsoft Federal Security CTO
![Security worker wearing glasses and looking at a computer monitor, surrounded by an overlay of code and charts.](https://www.microsoft.com/en-us/industry/microsoft-in-business/wp-content/uploads/sites/28/2022/01/cyber_eo_heroimg_800x602-300x226.webp)
![Digital security concept](https://www.microsoft.com/en-us/industry/microsoft-in-business/wp-content/uploads/sites/28/2021/08/GettyImages-1193139637-300x169.webp)
Published
Uncovering new unknowns: How to approach EDR & logging Cyber EO milestones
Our ongoing series on the Biden Administration’s Cybersecurity Executive Order (EO) has covered considerable ground to date — from demystifying the Zero Trust journey to providing strategies for securing critical software and classifying agency data — but there is still work to be done as we look ahead to the next wave of approaching milestones.![Cropped shot of a young computer programmer looking through data](https://www.microsoft.com/en-us/industry/microsoft-in-business/wp-content/uploads/sites/28/2021/08/GettyImages-834500976-300x141.webp)
Published
EO Strategies for Securing Critical Software & Classifying Agency Data
So far in our ongoing series on the Biden Administration’s Cybersecurity Executive Order (EO) to bolster the U.S. Government’s resilience against cyberattacks we’ve taken a look at what’s next for federal agencies and then mapped out major milestones.![Photo of Chief Warrant Officer 4 Sharon Mullens taken for October 2016 national recruiting advertisement featuring Army cyber Soldiers.](https://www.microsoft.com/en-us/industry/microsoft-in-business/wp-content/uploads/sites/28/2021/06/Cybersecurity_11-300x200.webp)
Published