Remove 2011 Remove Networking Remove Risk Management
article thumbnail

DoD Embracing Continuous Monitoring (E172)

FedInsider

serves as Director, G36 Cyber Defense and Network Operations, U.S. as a fellow at the National Security Agency; as ARCYBER chief of DoD Network Operations; and as commander of 2nd Battalion, 1st Information Operations Command, one of the Army’s NSA Certified Red Team organizations. Army Cyber Command (ARCYBER). Marine Corps.

article thumbnail

Government Strategies & Investment for AI

FedInsider

CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Using Data to Fortify Network Defense (E151)

FedInsider

As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, risk management, agency incident response plans, and programs. Close Moderator & Contributing Editor , FedInsider The post Using Data to Fortify Network Defense (E151) first appeared on FedInsider.

article thumbnail

Identity Governance & Zero Trust: Best Practices for a Multi-Cloud Environment

FedInsider

Distributing agencies’ application infrastructure and workloads among different clouds has benefits, such as greater resilience, targeted cost management, and greater flexibility in the future by avoiding lock-in with one provider. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.

article thumbnail

Challenges of Continuous Compliance with a Remote Workforce (E147)

FedInsider

He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity Risk Management Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to Risk Management. Close CISO, U.S.

article thumbnail

Challenges of Continuous Compliance with a Remote Workforce

FedInsider

He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity Risk Management Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to Risk Management. Close CISO, U.S.

article thumbnail

Who are you – and can you prove it? Identity and Access Management

FedInsider

He began his career as a network engineer and a systems administrator. He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and Project Management Professional (PMP) certifications.