This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Data and AI-driven tools can increase visibility into, and lessons learned from hiring, onboarding, and turnover, but understanding the significance of those findings and their impact on the workforce and overall mission success is key to realizing the full potential of HR modernization.
Despite being rich in data, many agencies are lagging in the data modernization needed to support AI – and combining incomplete or inaccurate data with AI can lead to hallucinations , ultimately placing mission delivery at stake.
Tuesday, October 31, 2023 | 2:00PM EDT | 1 Hour | Training Certificate We all now live in a data-driven world. And the federal government may be the single largest generator – and user – of data in the world. Without a comprehensive data strategy, the legal and ethical challenges limit the potential of this emerging technology.
Alongside that comes understanding the location, nature, and sensitivity of the data within the agency. The two are complementary, since part of digital identity is restricting access to the data a user has the right to touch. Jennifer joined GAO in 2006. & CIO, Dept.
When the federal government adopts Zero Trust principles, it must consider both user identity and the data being accessed. To view this webinar: Zero Trust: Protecting Both Data and Identity. Jennifer joined GAO in 2006. Franks is a Director in GAO’s Information Technology and Cybersecurity team.
UK Biobank is the world’s most comprehensive source of health data used for research. From 2006–2010, UK Biobank recruited 500,000 UK citizens between the ages of 40 and 69 to supply biological samples (blood, urine, and saliva) and information about their lifestyle regularly on an ongoing basis.
Years ago, Federal leaders would dream of getting terabytes of data; few thought we would have more computing power than trusted information. This week on Feds At the Edge, our discussion focuses on some of the risks in storing, sharing, and analyzing that data. What impact does generated data have? Share everything?
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. As a Cyber Leader in the U.S
Mountains of data and Artificial intelligence are impacting every aspect of all federal agencies. This is the perfect example of how using data & AI will help all federal agencies in the three methods we explore: We’ll explore identity management on the large scale, advances made, and the challenge of digital credentials.
Since its creation in 2006, the Biomedical Advanced Research and Development Authority has funded the development of medical countermeasures for pandemic influenza, anthrax, smallpox, Ebola virus disease, Zika virus, and, of course, COVID-19. BARDA expects the period of performance to begin in the second quarter of fiscal year 2024.
Delving into data is a passion of mine. Whether analyzing financials, customer KPIs, marketing data, or federal spending data, I rely on data for not just monitoring the performance of our business and our government, but for making informed decisions with real-time information.
Her focus areas included Data Centers, Data Systems/Services, Storage, Virtual Desktop Infrastructure (VDI), Continuity of Operations (COOP), Disaster Recovery, Inside/Outside Plant Telecommunication Cable Distribution, Networking, and Cooperative Research and Development Agreements (CRADAs).
At the federal level, the Office of Management and Budget (OMB) issued a memo in March providing guidance for agencies to establish AI governance and risk management techniques while implementing innovative uses for their own organizations, including steps to enable sharing and reuse of AI models, code, and data.
This week we’re diving right in with data, more specifically the expanded cyber landscape full of personal data malicious actors gained easier access to as the workforce transitioned into remote working. We will also address the double-edge sword of automation.
Akiba has 25+ years of experience leading software and services businesses for government and commercial clients in the domains of cybersecurity, data and analytics and collaboration. Most recently, she led the i2 Intelligence Analysis business serving national security, defense and law enforcement clients around the globe.
in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006.
devices use 5G, 51% of data traffic is 5G. He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. At the 5G Americas conference in October 2023, the keynote speaker said the U.S./Canada
Attackers can gain unauthorized access to a company’s data if Active Directory is compromised; monitoring your AD will help protect system integrity, availability, and overall cybersecurity. Kevin also leads Leidos’ Identity, Credential, Access Management (ICAM) strategy.
Most recently, Vogelsang was the Vice President of Strategy and Technology for Nokia’s Network Infrastructure division where he helped launch new technology offerings, including IP network analytics and security, data center switching, client optics, optics integration with ASICs and Silicon photonics.
She oversees work on emerging cybersecurity issues and federal agencies’ abilities to protect privacy, sensitive data, and the computing infrastructure. Jennifer joined GAO in 2006. Franks is a Director in GAO’s Information Technology and Cybersecurity team.
He has also spearheaded the “AI-able Data Ecosystem” pilot, creating a new approach for public-private collaborations with personnel/resources across a dozen agencies and working with companies internationally. Close Director, National AI Institute, U.S. In addition to a B.S.
For instance, 5G networks must have state-of-the-art security and encryption, since they will be targets of cyber attacks, espionage and data breaches. He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006.
Kevin joined GAO in June 2006, and led projects related to FITARA and GAOs High Risk area on Improving the Management of IT Acquisitions and Operations. He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006.
And when we think through a space station and, the platform, there’s a lot of data that is generated in space, structured and unstructured data. And for lack of a better analogy, the ability to send all of that data down the pipes are restricted to pipes are kind of clogged. Matt Kuta Right? Who might that be?
Wednesday, November 8, 2023 | 2:00PM EST | 1 Hour | Training Certificate Many government agencies wrestle with their legacy systems and outdated processes every day, especially when it comes to cybersecurity and data flow. This is one area where artificial intelligence can provide assistance to address the challenges.
In those roles, she optimized NSA’s IT strategy for the CIO Inspector General and Policy, IT Accessibility, Chief Information Security Officer, and Chief Data Officer portfolios. Team members are experts in key domains including enterprise data management, business analytics, hybrid cloud strategy and cyber security.
To accomplish this transformation in state government service delivery, in 2020 the Florida Digital Service was created to help agencies use technology more effectively, move toward data-driven solutions, and improve Floridians’ digital interactions with government.
Another way the CDM program is evolving is by becoming more modular and “more of a data-centric type of activity beyond just a toolset activity,” according to Richard Grabowski, the CDM deputy program manager.
Another way the CDM program is evolving is by becoming more modular and “more of a data-centric type of activity beyond just a toolset activity,” according to Richard Grabowski, the CDM deputy program manager. And cybersecurity professionals and technology asset managers alike should be aware of CDM Vulnerability Management (VUL) Capability.
From heavy security requirements and vast amounts of data to limited budgets, we’re unpacking the challenges and exploring innovative solutions to solve the vexing crisis agencies face today. In this week’s episode of Feds at the Edge, we will dive into the unique challenges the federal government faces in identity management.
Colin Crosby Service Data Officer & Deputy DON Chief Data Officer Colin Crosby is an accomplished leader currently serving as the Marine Corps Service Data Officer (SDO) and Deputy DON Chief Data Officer (CDO). He currently leads a growing team of over 450 data scientists, engineers, consultants and domain experts.
To accomplish this transformation in state government service delivery, in 2020 the Florida Digital Service was created to help agencies use technology more effectively, move toward data-driven solutions, and improve Floridians’ digital interactions with government.
Compliance is difficult enough in an air-conditioned data center, so for those out on the edge with spotty communication and potential bullets flying around, it could be near impossible. Despite this disruption, newly coined Denied Disconnected Latent, or DDL, when communications are restored, compliance still must be maintained.
Compliance is difficult enough in an air-conditioned data center, so for those out on the edge with spotty communication and potential bullets flying around, it could be near impossible. Despite this disruption, newly coined Denied Disconnected Latent, or DDL, when communications are restored, compliance still must be maintained.
This week we’re diving right in with data, more specifically the expanded cyber landscape full of personal data malicious actors gained easier access to as the workforce transitioned into remote working. We will also address the double-edge sword of automation.
Equally, Viral brings deep experience in enterprise-grade software development and data science to bear on the development of clients’ data strategies, guiding them through implementation with sound management, governance, cyber security, and platform decisions that take into consideration the organization’s history and culture.
Equally, Viral brings deep experience in enterprise-grade software development and data science to bear on the development of clients’ data strategies, guiding them through implementation with sound management, governance, cyber security, and platform decisions that take into consideration the organization’s history and culture.
Equally, Viral brings deep experience in enterprise-grade software development and data science to bear on the development of clients’ data strategies, guiding them through implementation with sound management, governance, cyber security, and platform decisions that take into consideration the organization’s history and culture.
AB 1903 finally takes a step towards further modernizing Californias law governing international commercial arbitration by codifying amendments made in 2006 to the UNCITRAL Model Law, including a new Article 7 and a new chapter IV A to replace Article 17. Additionally, section 1297.73(b)(1) And Section 1297.73(b)(2)
Specifically, “registered in SAM” means: The offeror has entered all mandatory information, including its unique entity identifier, the Electronic Funds Transfer (EFT) indicator, its Commercial and Government Entity (CAGE) code, and data required by the Federal Funding Accountability and Transparency Act of 2006; The offeror has completed the Core, (..)
And ransomware attacks are evolving; rather than encrypting victims’ data, they are straightforwardly stealing the information and extorting payment by threatening to post the info online or to simply erase it. Many of these threats are new takes on old ones, such as “leveling up” invoice fraud.
a day—are poorer today than before COVID-19 and deeper in debt than at any time since 2006. A critical finding and recommendation of the World Bank report is to strengthen the transparency and efficiency of public spending and procurement, including through open data and digital procurement reforms.
Tuesday, September 24, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In the rapidly advancing world of artificial intelligence (AI), government agencies are leveraging AI technologies to enhance security, operational efficiency, and data analysis across various sectors. Before joining GSA, Zach served as the Chief Data Officer at the U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content