Remove 2003 Remove Data Remove Project Management
article thumbnail

Cyber Attacks are Just as Damaging as Natural Disasters

FedInsider

Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Air Force Reserves. As a Cyber Leader in the U.S

article thumbnail

Big or small business, ‘this’ type of federal contractor does the best job

Federal News Network

Interview transcript: James Hasik I tapped into a think here to for little used database within the federal government that is nonetheless vast and I think, has enormous potential for telling federal procurement officials a great deal more about about about how their contract is performing, if they actually just looked at the data statistically.

Contract 105
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Who are you – and can you prove it? Identity and Access Management

FedInsider

In this week’s episode of Feds at the Edge, we will dive into the unique challenges the federal government faces in identity management. From heavy security requirements and vast amounts of data to limited budgets, we’re unpacking the challenges and exploring innovative solutions to solve the vexing crisis agencies face today.

article thumbnail

To Succeed with Zero Trust & AI, Look to Cultural Change

FedInsider

In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.

article thumbnail

Automation as a Cybersecurity Resource (E180)

FedInsider

Managing vast amounts of data, reducing alert fatigue, and improving threat detection can all be accomplished with automation. During his tenure in ENTSD, he oversaw the modernization of the largest data network in DHS, improved connectivity to cloud service providers, and dramatically increased the agencys usage of mobility platforms.

article thumbnail

How to Succeed with Zero Trust & AI, Look to Cultural Change

FedInsider

In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.