This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Air Force Reserves. As a Cyber Leader in the U.S
Interview transcript: James Hasik I tapped into a think here to for little used database within the federal government that is nonetheless vast and I think, has enormous potential for telling federal procurement officials a great deal more about about about how their contract is performing, if they actually just looked at the data statistically.
In this week’s episode of Feds at the Edge, we will dive into the unique challenges the federal government faces in identity management. From heavy security requirements and vast amounts of data to limited budgets, we’re unpacking the challenges and exploring innovative solutions to solve the vexing crisis agencies face today.
In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.
Managing vast amounts of data, reducing alert fatigue, and improving threat detection can all be accomplished with automation. During his tenure in ENTSD, he oversaw the modernization of the largest data network in DHS, improved connectivity to cloud service providers, and dramatically increased the agencys usage of mobility platforms.
In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content