article thumbnail

Cyber Attacks are Just as Damaging as Natural Disasters

FedInsider

He holds a Bachelor of Arts degree in Organizational Leadership from Fordham University and is a Certified Information Systems Security Professional and Project Management Professional. Air Force Reserves.

article thumbnail

Who are you – and can you prove it? Identity and Access Management

FedInsider

He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and Project Management Professional (PMP) certifications.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5G as a Digital Transformation Accelerant

FedInsider

He also supported the development, deployment and testing and evaluation of commercial and military systems such as IRIDIUM and MILSTAR. He holds a BS in Electrical Engineering from Columbia University NYC and an MS in Electrical and Computer engineering from George Mason University.

article thumbnail

To Succeed with Zero Trust & AI, Look to Cultural Change

FedInsider

In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.

article thumbnail

Automation as a Cybersecurity Resource (E180)

FedInsider

He holds a Bachelor of Arts degree in Organizational Leadership from Fordham University and is a Certified Information Systems Security Professional and Project Management Professional. Air Force Reserves.

article thumbnail

How to Succeed with Zero Trust & AI, Look to Cultural Change

FedInsider

In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.