This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Securities & Exchange Commission Wilbert Vaughn × Wilbert Vaughn CDM Program Branch Chief Wil Vaughn has been in the information Technology business for over 30 years; first as a software programmer, a Senior ProjectManager, now as a Cyber Security IT Specialist.
Throughout the day, each of us makes decisions based on available data. Think about all the precise, real-time data the U.S. The challenging thing about data [is] it grows exponentially,” said Scott Woestman Vice President of Sales, U.S. “The Public Sector, with Alation, a data intelligence firm.
To ensure data security, Amazon Bedrock inputs and model outputs are not shared with any model providers. Working on projects like these has pushed me to develop myself as an engineer, improve my teamwork and projectmanagement skills, allowed me to work with so many amazing people, and so much more.
Public sector and commercial enterprises are ingesting ever-growing amounts of data into their enterprise operations. That’s placing greater demands on enterprise IT executives to ensure the requisite data privacy and security controls are in place and functioning effectively. They also explained what happens to data inside Gemini.
The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement.
In Part 1 , we told you about some of the ways government agencies are using data to make a difference. Workforce Management Government struggles with recruitment and retention: Technical talent generally is hard to find, and industry employers lure qualified candidates with salaries and perks that agencies cannot afford.
Having worked in Texas state government for more than 15 years, Chief Data Officer Neil Cooke understands firsthand the difference that data can make. Cooke began working for Texas in 2007, when he took a job at the Department of Agriculture, first as a systems analyst and later as a management analyst and projectmanager.
Source: USDWS Resources for pursuing a design-led approach: 18F Article on Barriers to User-centered Design : The article identifies key barriers — time and money shortfalls, a “we just need something to show” mindset, and others — and gives real-world guidance on how to overcome them.
Prior to DOE and his pursuit of public service, Dr. Kusnezov had a long career in academia where he published more than 100 articles and edited two books. Singh is passionate about process and projectmanagement. The critical thread across roles is Program, Process and ProjectManagement.
6 Steps to Success But great rewards are possible with effective change management. It requires a disciplined projectmanager, akin to an orchestra conductor who ensures that all pieces of the project work in harmony, Oliver said. This article appears in our guide, “ How to Kickstart Modernization.”
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
They can be very complex, and they always require extensive research into sources such as website analytics and survey data. The maps feature icons, multiple colors, and some combination of charts and diagrams, making them useful tools for understanding and improving agency CX. You do not draft journey maps on a whim.
They are responsible for managing the entire project, including hiring subcontractors, coordinating tasks, and ensuring compliance with federal regulations and contractual obligations. This article will explore what is prime contractor roles, responsibilities, and the importance of prime contractors in government projects.
The first aid I learned as a teenager have also helped me with projectmanagement. On several occasions I had to practice first aid on my projects. Or teach my team to handle a project emergency while I was away. The same goes for the injured project. What’s In Your Project First Aid Kit?
According to Summer Xiao , Deputy CIO in Houston’s ProjectManagement Office, “The public actually doesn’t want to engage with you.” The system looks at CX drivers such as employee helpfulness, ease and simplicity, and equity; it can analyze response data based on geographical location, type of service, demographics and other concerns.
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
This article covers how a small business government contractor can qualify, find opportunities, and thrive in this space. Management approach: outline your approach to projectmanagement and how you will ensure successful execution. Want to expand your small business with government contracts?
Up until a couple of years ago, we didn’t even have any data scientists at CMS,” Fletcher said. We had more people wanting a job as a data scientist at CMS than we had open spots, which is amazing for us.” We have a really robust data science community,” she explained. Her efforts are paying off. “Up
Featured Speakers: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
In a 2016 article, the Centre for Public Impact, a government consulting firm, said that “the future public servant will increasingly need to think and act like an entrepreneur.” This is, in a sense, gathering data that can help build your case for change. If it isn’t here now, that future is coming fast. Get the guide.
To transform the process of getting to X, Gordian recommends a three-pronged approach to managing risk: reliable data, secure technology and expert services. Dig Deep Into Data The gold standard for construction cost data is Gordian’s RSMeans data.
But often state and local government workers spend too much of their time wrangling incompatible systems, struggling to get data, and meeting reporting requirements. This article is an excerpt from GovLoop’s guide titled “ Bright Ideas for Making Cyber Stick.” Automate to Collaborate. ” Download the guide.
But often state and local government workers spend too much of their time wrangling incompatible systems, struggling to get data, and meeting reporting requirements. This article first appeared in “ Your Guide to Building Constituent Engagement.” And while they’re doing that, they’re not serving the community.
Read on to meet the writers who will contribute two articles each month until July. They have impressive government and industry experience and will cover topics such as IT; diversity, equity and inclusion; workforce management; process improvement; leadership; career building; and customer experience, to name just a few. Favorite
CPE In 2023, 725 data breaches were reported to the Department of Health and Human Services, according to HIPAA Journal. CPE credit in Business Management & Organization.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. Wednesday, August 28, 2024 | 2:00PM EDT | 90 Minutes | 1.5
Also, giving examples of my projects that highlighted universal skills helped me be successful. Every organization does some form of projectmanagement, budget review or data use, so I focused on telling my work history using those universal skills and common language. This article originally appeared on August 5, 2020.
He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and ProjectManagement Professional (PMP) certifications.
The pandemic has accelerated digital transformation, it’s accelerated the data culture. This article appeared in slightly different form in GovLoop’s guide, Innovations 2022: Conversations That Matter. “We would have preferred to have done it differently, but it feels like we leapfrogged 10 years in about 10 months.
In my last two articles ( here and here ) I’ve been talking about the need for Procurement to think about how we can move beyond our historical transactional role and embrace approaches to help drive competitive advantage and real value for our organisations. Then we come to the “need for speed” when we interface with suppliers.
Estimate documentation should describe how the source data was used, the calculations performed and their results, and the estimating methodology used. It should be based on historical data or actual experiences with other comparable programs and be updated regularly to reflect changes in the program. Well-documented.
In the complex world of government contracting, managing risks associated with subcontractors is a critical skill that can make or break your project’s success. This article will delve into the best practices for mitigating risks and ensuring smooth collaboration with your subcontractors.
A member of the Senior Executive Service of the Federal Government, La Monte holds a Bachelor of Science in Liberal Arts with a focus in Management from Excelsior College, a Master of Science in Cybersecurity from Webster University, and a Master of Science in Information Assurance from Strayer University. He joined INL four years go.
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
It is substantiated and grounded by historical data combined with the reality, context, and specific circumstances of the project being delivered. This article offers the perspective of an Owner’s Representative with training and experience in Public Sector Procurement, Risk, and ProjectManagement.
Modisette has a bachelor’s degree in computer science and a master’s degree in information systems security management and a graduate certificate in projectmanagement. He holds CISSP, CGEIT, ITIL, ZTCA and MCSE certifications.
In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.
Programmatic DataManagement: AI-based automation platforms will help agencies enhance their use of data in decision-making and planning enterprise-wide. This article appeared in our guide, “ Agencies Draw a New Modernization Blueprint.”
Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface Human Interaction: Learn the critical role humans play amid the new promises of AI Contingency Plans: If your agency was attacked today with ransomware, would you be able to identify your critical data?
Close Publisher, FedInsider Joe Dabrowski × Joe Dabrowski Regional Vice President, SLED Joe leads America’s State, Local and Education Sales organization at Rubrik, working with SLED customers around the country on leveraging the Rubrik Data Security platform to drive cyber resiliency. Murphy, Ph.D. × × John B.
In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.
Wednesday, November 1, 2023 | 1:00PM EDT | 2 Hours | Training Certificate Ever since the dawn of the internet, its value lies in the data it handles, whether moving it, storing it, or calculating with it. and state agencies’ data because they need the money. Even hostile nation-states such as North Korea seek U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content