This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Government interest in predictive artificial intelligence for zero-trust security has increased along with the number of vulnerabilities identified on federal networks. Google researchers found nearly 100 zero-day vulnerabilities, a record number of network exploits, that went
“Because if you tried to do it sequentially — maybe networks first, then data, then identity — it would take too much time.” Office of Management and Budget Memo M-22-09 requires them to meet zero-trust objectives by the end of fiscal year 2024. And for federal civilian agencies, the clock is ticking. That includes…
Wednesday, March 6, 2024 | 2:00PM EST | 1 Hour | 1 CPE The whirlwind of artificial intelligence tools in 2023 proved the government is eager to embrace the technology as soon as possible. He has over 20 years of technology consulting experience in the areas of data visualization, geospatial analytics, data management, and data science.
Lumen Technologies and Zscaler have teamed up to offer a managed zero trust network access service designed to help government agencies and affiliates mitigate cybersecurity risks by safeguarding access to their critical data and infrastructure.
Wednesday, April 3, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems.
The Army has a plan to no longer “fight the network.” Through the Unified Network Operations (UNO), initiative, the Army wants to create an agile, software-defined network that is easy to set up and use. The Army is laying the groundwork for this new network set up under UNO in a new draft request for proposals that Lt.
The “exorbitant” amount of data being taken in by the U.S. Data overload is real,” said Young Bang , principal deputy assistant secretary of the Army for Acquisition, Logistics and Technology, during a panel discussion at the ExecutiveBiz Army Acquisition Priorities: Balancing Readiness and Modernization Forum on Wednesday.
Lawmakers contend that is an incomplete picture of the data. CMMC is coming, but concerns for small businesses persist under revamped rule - Federal News Network) The Army has laid out its initial thinking of a new contract to set up an agile software development pipeline for recruiting. Gerry Connolly (D-Va.) introduced the bill.
Following our recent overview of topics to watch in the National Defense Authorization Act (“NDAA”) for Fiscal Year (“FY”) 2024, available here , we continue our coverage with a “deep dive” into NDAA provisions related to cybersecurity and software security in each of the Senate and House bills. The provisions direct DoD to leverage U.S.
The Army has been talking for many, many years about the need to simplify its IT networks. It also doesn’t hurt that network simplification is a major priority for the Army’s new chief of staff. It also doesn’t hurt that network simplification is a major priority for the Army’s new chief of staff.
ACT and HAND have been strengthening Thailand’s anti-corruption network not just with large public organizations but also with local civil society groups. A publicly available tool, ACT Ai aggregates data on over 31 million public procurement projects, linking them with company registration data to detect potential fraud and corruption.
Tuesday, August 20, 2024 | 2:00PM EDT | 1 Hour | 1 CPE As agencies face unprecedented data volumes and velocity, managing the speed and size of the data flow efficiently becomes a significant challenge , especially with the growing use of AI-based analytics.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
Wednesday, March 20, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. Alongside that comes understanding the location, nature, and sensitivity of the data within the agency. & CIO, Dept.
Thursday, January 18, 2024 | 2:00PM EST | 1 Hour | Training Certificate State and local governments and education produce large amounts of unstructured data in a wide range of data types. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educational and government operations.
With the rise of remote work and the explosion of the Internet of Things (IoT) generating large volumes of data in the field, agencies want to provide staff the ability to analyze and use that data in the field as well. But there’s a catch: They also need to secure that data. This is the concept of edge computing. The solution?
Andrew Manos, Director, Commercial Services for True Zero Technologies, suggests that, given today’s data volume, centralizing data is essential. To view this webinar: How to Fight Threats to the Software Supply Chain. Department of Defense.
Announced at AWS re:Invent 2024, Satellite Resiliency for AWS Outposts offers a comprehensive, Partner-managed solution for resilient cloud-connected edge computing that extends the reach of Amazon Web Services (AWS) to the most remote and geographically dispersed environments on earth.
Most experts agree that the long-term potential of artificial intelligence (AI) depends on building a solid foundation of reliable, readily available, high-quality data. One area where data quality and readiness play a particularly crucial role for federal, state, and local government agencies is identity management.
Children’s National Hospital , Nationwide Children’s Hospital , and the Children’s Brain Tumor Network will receive $1 million each from AWS to support their work. AWS also announced a $3 million philanthropic commitment to three nonprofit organizations who are mission-driven innovators for pediatric and children’s causes.
Attendees network during IMAGINE: Nonprofit 2023. Whether it’s your first time attending, or your eighth, here are a few tips to make the most of IMAGINE: Nonprofit 2024. Hear from customer speakers from Data Friendly Space and AARP. Round off the day at the networking reception.
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. He leads the Network Operations, Cybersecurity, and Outside Plant functions.
Thursday, April 11, 2024 | 12:00PM – 5:00PM EDT | 3 CPE | Albany, NY The state of New York and many of its cities are aggressively pursuing a strategic overhaul of the delivery of services to residents. And both consider using innovative technologies to deliver superior experiences a critical advantage in building a stronger economy.
In that same vein, for Leigh Palmer, Google Public Sector’s new accreditation for Google Distributed Cloud Hosted to handle secret and top secret data for the Department of Defense and intelligence community was the biggest announcement to come out of the conference. ” Palmer said. That is what Google is really good at.”
Anthony Genatempo, program executive officer for cyber and networks for the Air Force and Space Force, drew a line in the contracting sand. Genatempo said during Federal News Networks AI and Data Exchange. The Air Force launched NIPRGPT , an unclassified version of ChatGPT, in June 2024. About a year or so ago, Maj.
Friday, February 9, 2024 | 2:00PM – 3:30PM EST | 90 Minutes | 1.5 Jones is responsible for all Agency IT systems and personnel, as well as the global communications network. CPE Cybersecurity has always contended with evolving threats. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
When the federal government adopts Zero Trust principles, it must consider both user identity and the data being accessed. To view this webinar: Zero Trust: Protecting Both Data and Identity. BigID enables organizations to know their enterprise data and take action for privacy, protection, and perspective.
The conventional wisdom about network and security operations has changed. Traditionally, the network operations center (NOC) and security operations center (SOC) largely have worked independently, each focusing on its own tasks, tracking its own data and using its own set of tools. To learn more, watch this clip (4:47 min.)
Recent advancements in wireless technology—including 5G, Multi-Access Edge Computing (MEC), and Fixed Wireless Access (FWA)—are paving the way for unprecedented flexibility in modernizing networks and enhancing mission support. Cost and efficiency : Wireless solutions reduce the need for costly cabling and networking hardware.
In the ever-expanding realm of data management, federal agencies face a pressing need to rethink their approach to effectively processing, analyzing and leveraging vast amounts of data. That’s why chief information and data officials within federal agencies must recognize the necessity of adopting a different data processing model.
Over the years, federal networks have become more complex. Visibility really is about understanding anything and everything that’s touching your networks, including your workflows in the cloud, so you can get your arms around what needs to be protected,” Schaffer said. True Story Corelight data makes a real-world difference.
Standards create the basis of security controls on which everyone can rely, said Richard Breakiron, Senior Director for Strategic Initiatives, Federal Sector, with Commvault, which provides agencies with comprehensive, intuitive, enterpriselevel data management solutions. You need to have a copy that is literally immutable.
The Air Force is out with a new multiple award solicitation to modernize all of its base network infrastructure. The new RFP calls for a group of large and small businesses to “modernize, operate and maintain the network infrastructure on all Department of the Air Force locations, to include Guard and Reserve bases.”
Having a completed checklist can give agencies a sense of security, but with today’s explosion of data and potential attack from an unexpected vector, have they been falsely “lulled into complacency?” And avoiding data hoarding to prevent hidden attack codes. To view this webinar: The Hard Truths of Data Security in the Public Sector.
The DOJ alleges that Lockheed Martin violated the Truth in Negotiations Act (TINA) which mandates that when negotiating sole source contracts, the government has access to the cost or pricing data that the offeror used when developing its proposal. During FY 2024, settlements and judgments under theFalse Claims Act exceeded $2.9
Years ago, Federal leaders would dream of getting terabytes of data; few thought we would have more computing power than trusted information. This week on Feds At the Edge, our discussion focuses on some of the risks in storing, sharing, and analyzing that data. What impact does generated data have? Share everything?
But there are strategies that make effective cyberattacks less likely and that protect data on which government depends. It’s a matter of if, not when,” said Chris Sprague, Principal Technologist with Pure Storage, which delivers forward-thinking security and data protection via a cloud experience. Breaches will happen.
Working backwards from employer demand for specific skills and roles, the Tech Alliance provides pathways for early career talent to jobs in cloud support, software development, and data integration. The West Virginia Tech Alliance will directly connect more than 750 learners to cloud employers throughout the 2024-2025 academic year.
The planned start date for the new framework is 11 July 2024. Further information can be found here: Procurement: recruitment advertising and public notices framework – gov.scot (www.gov.scot) Vehicle hire services The existing Cat B Contract for Vehicle Hire Services is due to expire on 31 August 2024.
Wednesday, May 22, 2024 | 2:00PM EDT | 1 Hour | 1 CPE It may seem ironic, but government agencies at all levels wrestle with the difficulty of compliance with regulatory requirements even as they issue regulations for others (sometimes including themselves) to meet.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
Wednesday, August 21, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Power grids, water systems, transportation networks and other vital services are essential to communities but lack substantial cyber defenses. Their vulnerabilities make them tempting targets, whether for nation-states or cybercriminals.
Wednesday, June 26, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content