Remove Books Remove Budget Remove Leadership
article thumbnail

Budgeting Priorities for Federal Deployment of Zero Trust (E130)

FedInsider

No longer trying to define what it is, focus is now on the affordability within already challenged budgets. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications. Agencies have matured in their understanding of zero trust. He has twice been awarded Jessie H.

Budget 134
article thumbnail

Budgeting Ideas to Reach a Zero Trust Future

FedInsider

In the face of new and growing threats many federal, state and local IT budgets stay the same, however. The challenge becomes how to plan and implement a zero trust environment within budgets that are slow to increase. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity.

Budget 131
article thumbnail

Budgeting Ideas to Reach a Zero Trust Future

FedInsider

In the face of new and growing threats many federal, state and local IT budgets stay the same, however. The challenge becomes how to plan and implement a zero trust environment within budgets that are slow to increase. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity.

Budget 98
article thumbnail

After an Attack: Cyber Recovery Best Practices for State & Local Agencies

FedInsider

And these organizations are likely to face tight budgets and limited manpower to deal with a cyber threat. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications. For many agencies, the reality is it’s a matter of when – not if – they will be attacked.

article thumbnail

Make Progress in Incident Response & Reporting

FedInsider

In August of that year, the Office of Management and Budget issued Memorandum 21-31 setting specific requirements for agencies to meet, for which the Cybersecurity and Infrastructure Security Agency (CISA) issued guidance regarding implementation. He has twice been awarded Jessie H.

article thumbnail

Build an Environment for Transformation

GovLoop

Ask if the result will justify the time and budget required. This post is excerpted from our e-book “4 Ways to Help Your Workforce Embrace New Tech.” “We may come in with a list of 20 or 25 items, and we have to pare it down to the three to five we’re going to do this quarter. Is it worth the effort? Gregg said.

Budget 105
article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

It has been almost two years since the Office of Management and Budget issued its federal zero trust architecture strategy, which set out specific goals for agencies to achieve by the end of fiscal year 2024. Prior to joining HHS, La Monte worked in various cybersecurity leadership roles including CISO of Headquarters, U.S.