This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
Modernization funding is almost always a concern, especially for longer-term projects. And the new technology has to work, which is a complicated and expensive endeavor when agencies have many network-connected devices. 6 Steps to Success But great rewards are possible with effective change management.
Prior to DOE and his pursuit of public service, Dr. Kusnezov had a long career in academia where he published more than 100 articles and edited two books. Singh is passionate about process and projectmanagement. The critical thread across roles is Program, Process and ProjectManagement.
With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to projectmanagement to cybersecurity and data. He leads the Network Operations, Cybersecurity, and Outside Plant functions.
They are responsible for managing the entire project, including hiring subcontractors, coordinating tasks, and ensuring compliance with federal regulations and contractual obligations. This article will explore what is prime contractor roles, responsibilities, and the importance of prime contractors in government projects.
The first aid I learned as a teenager have also helped me with projectmanagement. On several occasions I had to practice first aid on my projects. Or teach my team to handle a project emergency while I was away. Bleeding out resources can also imperil projects. The same goes for the injured project.
To view this webinar: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust. Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & ProjectManager Alper Kerman is a security engineer and projectmanager at the National Cybersecurity Center of Excellence (NCCoE), NIST.
In building an innovation space and an innovation network, the more touchpoints, the better. This article appears in our guide, “ How to Change Things Up (and Make It Stick).” “Evolve the work and make it relevant,” advised Busser.
With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to projectmanagement to cybersecurity and data. He leads the Network Operations, Cybersecurity, and Outside Plant functions.
While making my plan to leave my former company, I knew I had to network in the nonprofit and government sectors based on my research. This made my networking more intentional and helped me gain focus on my career plan. Also, giving examples of my projects that highlighted universal skills helped me be successful. Favorite.
He began his career as a network engineer and a systems administrator. He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and ProjectManagement Professional (PMP) certifications.
This article covers how a small business government contractor can qualify, find opportunities, and thrive in this space. Management approach: outline your approach to projectmanagement and how you will ensure successful execution. Want to expand your small business with government contracts?
She presents at conferences worldwide, holds several recognized IT, security, and projectmanagement certifications and has a Master of Science degree in Information Technology. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
The virtual private network (VPN) failed because it wasn’t designed to have all users log in at once. “It This article appeared in slightly different form in GovLoop’s guide, Innovations 2022: Conversations That Matter. Upgrade Technology to Support Remote Work. It was really the prompt nature of state employees.
Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge , we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “ zero trust model.” Limiting our understanding to “the main and the plain” could lead to trouble.
Winning management consultancy contracts via competitive tender can be lucrative yet challenging. This article provides a comprehensive guide for consultancies on improving their chances of success when bidding for management consulting tenders, whether from government entities, NGOs, or private sector companies.
With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to projectmanagement to cybersecurity and data. He leads the Network Operations, Cybersecurity, and Outside Plant functions.
Building trust and connections across networks takes time and energy. We have all these platforms — Teams and Zoom — that we use for talking about projects and due dates. This article first appeared in “ Your Guide to Becoming an Adaptive Agency ,” from GovLoop. Build Trust and Communication. Get the guide.
Coaching is available to federal employees through the Federal Coaching Network, and some states, such as Virginia, offer individual and team coaching. “A This article appears in our guide, “ The 5 Habits of Highly Productive Agencies.” So, keep your lists.
Modisette has a bachelor’s degree in computer science and a master’s degree in information systems security management and a graduate certificate in projectmanagement. Federal Civilian teams at Palo Alto Networks through the creation and delivery of business-relevant security conversations to our key customers.
This article appeared in our guide, “ Tools and Tactics for Employee Engagement.” Every organization has internal systems or processes that frustrate employees. And internal problems often reverberate as subpar customer experiences.
In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.
For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. In his current role and prior roles, he has managed the backup and disaster recovery solutions.
DoD, he has been awarded the Annual Individual Award for Defending the DoDs Networks. For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. pharmaceutical supply chain.
In this role, she was responsible for securing Federal Information Security Management Act (FISMA) systems that store sensitive information, including one of NIH’s High Value Assets, several thousand workstations and servers, numerous medical instruments, mobile devices, portable media, third-party systems, and other IT systems.
For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Jorge earned a Master of Business Administration (MBA) from the Jack Welch Management Institute.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content