Remove Article Remove Data Remove Project Management
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Securities & Exchange Commission Wilbert Vaughn × Wilbert Vaughn CDM Program Branch Chief Wil Vaughn has been in the information Technology business for over 30 years; first as a software programmer, a Senior Project Manager, now as a Cyber Security IT Specialist.

article thumbnail

Finding Data Catalogs Drive Agency Missions

GovLoop

Throughout the day, each of us makes decisions based on available data. Think about all the precise, real-time data the U.S. The challenging thing about data [is] it grows exponentially,” said Scott Woestman Vice President of Sales, U.S. “The Public Sector, with Alation, a data intelligence firm.

Data 94
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cal Poly seeks to transform procurement process with generative AI-powered scope of work generation

AWS Public Sector

To ensure data security, Amazon Bedrock inputs and model outputs are not shared with any model providers. Working on projects like these has pushed me to develop myself as an engineer, improve my teamwork and project management skills, allowed me to work with so many amazing people, and so much more.

article thumbnail

Smoothstack’s Chris Coligado: Cybersecurity, AI Among Top In-Demand Federal IT Skills in 2025

ExecutiveBiz

In an article published on the company’s website, […]

Demand 69
article thumbnail

Keeping public sector data private and compliant with AI

FedScoop

Public sector and commercial enterprises are ingesting ever-growing amounts of data into their enterprise operations. That’s placing greater demands on enterprise IT executives to ensure the requisite data privacy and security controls are in place and functioning effectively. They also explained what happens to data inside Gemini.

Data 66
article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement.

article thumbnail

Where Data Makes a Difference, Pt. 2

GovLoop

In Part 1 , we told you about some of the ways government agencies are using data to make a difference. Workforce Management Government struggles with recruitment and retention: Technical talent generally is hard to find, and industry employers lure qualified candidates with salaries and perks that agencies cannot afford.

Data 52