Remove 2006 Remove Integrity Remove Networking
article thumbnail

CyberSmart 2024: Cybersecurity Faces a Rapidly Changing Landscape – Washington DC

FedInsider

At the same time, historically-offline operations technology is beginning to be integrated with IT systems, opening up the OT to attacks that previously weren’t feasible. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.

Media 145
article thumbnail

Data & AI are Driving HR Modernization

FedInsider

He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.

Data 130
article thumbnail

Diversity of Thought & Agency Success

FedInsider

He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.

article thumbnail

Cyber Attacks are Just as Damaging as Natural Disasters

FedInsider

He also served as the Senior Executive Service as the Executive Director (XD) of the Office of Information and Technology (OIT) Enterprise Networks and Technology Support Directorate (ENTSD) at CBP, as well as serving concurrently in the role of Acting XD of the Border Enforcement and Management Systems Directorate. Air Force and U.S.

article thumbnail

Data and AI: Top Trends Shaping Government in 2024

FedInsider

He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.

Data 119
article thumbnail

Creating a Zero Trust Ecosystem

FedInsider

The pillars include continuous authentication; comply-to-connect, device detection and compliance; continuous monitoring and ongoing authorization; data encryption and rights management; software-defined networking; policy decision point and policy orchestration; and threat intelligence.

article thumbnail

Zero Trust: Protecting Both Data & Identity

FedInsider

Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss how integrating these two elements facilitate creating policies and controls that adapt in real time risk, reduce the attack surface, and mitigate the danger of data breaches.

Data 96