Remove 2003 Remove Integrity Remove Project Management
article thumbnail

Cyber Attacks are Just as Damaging as Natural Disasters

FedInsider

He holds a Bachelor of Arts degree in Organizational Leadership from Fordham University and is a Certified Information Systems Security Professional and Project Management Professional. Air Force Reserves.

article thumbnail

Who are you – and can you prove it? Identity and Access Management

FedInsider

He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and Project Management Professional (PMP) certifications.

article thumbnail

5G as a Digital Transformation Accelerant

FedInsider

Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S. He also supported the development, deployment and testing and evaluation of commercial and military systems such as IRIDIUM and MILSTAR.

article thumbnail

To Succeed with Zero Trust & AI, Look to Cultural Change

FedInsider

In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.

article thumbnail

Automation as a Cybersecurity Resource (E180)

FedInsider

He holds a Bachelor of Arts degree in Organizational Leadership from Fordham University and is a Certified Information Systems Security Professional and Project Management Professional. Jeff has more than 25 years of experience conducting systems integration and defense in depth network security. Air Force Reserves.

article thumbnail

How to Succeed with Zero Trust & AI, Look to Cultural Change

FedInsider

In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.