This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Wednesday, April 3, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. He has twice been awarded Jessie H.
Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. Garris is accomplished technologist with over 26 years of federal cybersecurity leadership expertise including 15 years leading cyber programs for the Federal Bureau of Investigation. He has twice been awarded Jessie H.
Tuesday, October 10, 2023 | 2:00PM EDT | 1 Hour | Training Certificate The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations.
Tuesday, August 20, 2024 | 2:00PM EDT | 1 Hour | 1 CPE As agencies face unprecedented data volumes and velocity, managing the speed and size of the data flow efficiently becomes a significant challenge , especially with the growing use of AI-based analytics. He also serves as a Professor of Data Science at Regis University.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
Thursday, January 18, 2024 | 2:00PM EST | 1 Hour | Training Certificate State and local governments and education produce large amounts of unstructured data in a wide range of data types. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educational and government operations.
At GovSpend, progress starts with the decisions and direction of our leadership teamthose setting the vision, shaping our strategy, and ensuring we build solutions that truly serve our users. Brian joined GovSpend in August 2024, bringing with him two decades of experience building AI-enabled big data applications.
Having a completed checklist can give agencies a sense of security, but with today’s explosion of data and potential attack from an unexpected vector, have they been falsely “lulled into complacency?” And avoiding data hoarding to prevent hidden attack codes. To view this webinar: The Hard Truths of Data Security in the Public Sector.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Costello is a nine-year veteran of the U.S
As Forbes describes it, “Traditional AI systems are primarily used to analyze data and make predictions, while generative AI goes a step further by creating new data similar to its training data.” In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
With data generation being on the ever-constant increase, new solutions to protect it are needed to keep up with the challenge. In this week’s episode of Fed At the Edge, we sit down with a veteran in data protection, Aaron Lewis – Head of Public Sector Sales, Engineering for Rubrik. Not all data is the same. Has it been tested?
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization. Food and Drug Administration. government policies, programs, and initiatives.
Prior to DOE and his pursuit of public service, Dr. Kusnezov had a long career in academia where he published more than 100 articles and edited two books. He has been in numerous leadership roles in the private sector for over 25 years, spanning accounting, finance, technology & operations management spheres.
CISAs new CDM Data Model Document(DMD) sets out the minimum set of data requirements needed to leverage the CDM solution to reduce every agencys threat surface, increase visibility into the federal cybersecurity posture, improve cybersecurity response capabilities, and streamline FISMA reporting. He has twice been awarded Jessie H.
Wednesday, June 26, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. He has twice been awarded Jessie H.
He has led numerous reviews of federal data center optimization and cloud computing, and was responsible for GAO’s work on the High-Risk area of Improving the Management of IT Acquisitions and Operations. He brings a strong background in public and private IT management and leadership. Dave joined GAO in July 2002. grandchildren.
Andrew Manos, Director, Commercial Services for True Zero Technologies, suggests that, given today’s data volume, centralizing data is essential. Nate Fontaine’s exceptional contributions to education, local and federal government, and community service embody the values of leadership, service, and honor.
He has over 20 years of technology consulting experience in the areas of data visualization, geospatial analytics, data management, and data science. In his role, Kyle builds teams that use data to create innovative solutions to difficult business challenges. He has twice been awarded Jessie H.
Berman served as an organization development psychologist and consultant for the VHA National Center for Organization Development where she provided data-driven OD services at all levels of VHA.
When hes not knee-deep in data, Alex is busy in Montgomery County, Maryland, juggling life as a proud new dad, snowboard enthusiast, and aspiring golf pro (on the days he can actually find the fairway). In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
It’s likely to be the largest breach the sector has ever faced, disrupting billions in payments to doctors and hospitals, and potentially exposing the personal data of one-in-three Americans,” Modern Healthcare reported. This “cyberattack … paralyzed much of the US healthcare system. He has twice been awarded Jessie H.
It’s likely to be the largest breach the sector has ever faced, disrupting billions in payments to doctors and hospitals, and potentially exposing the personal data of one-in-three Americans,” Modern Healthcare reported. This “cyberattack … paralyzed much of the US healthcare system. He has twice been awarded Jessie H.
This week we’re diving right in with data, more specifically the expanded cyber landscape full of personal data malicious actors gained easier access to as the workforce transitioned into remote working. We will also address the double-edge sword of automation. He has held security, telecommunications and I.T.
In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. He has twice been awarded Jessie H.
This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
Harnessing AI is a useful way to advance modernization goals, but AI governance—including ethical considerations, data security, and compliance with federal regulations—must remain a top priority. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. Prior to joining HHS, La Monte worked in various cybersecurity leadership roles including CISO of Headquarters, U.S. He has twice been awarded Jessie H.
Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter – suddenly the systems had to become decentralized, distributed and open to remote workers. He has twice been awarded Jessie H.
Tuesday, March 26, 2024 | 11:00AM EDT | 1 Hour | 1 CPE As agencies increasingly migrate their workloads to the cloud, it is crucial to understand the implications and benefits of writing natively to the cloud, which enables organizations to optimize their data protection strategies, streamline operations, and enhance overall security.
Book your group rate for CGP Fall Training Conference at the Residence Inn Marriott by clicking here. Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. miles away from the Fairview Park Marriott. miles away from the Residence Inn Marriott.
Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan is VP, Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics. He has twice been awarded Jessie H.
“If you’re able to quantify the cost of doing nothing,” Jackson said, “and show an agency that it’s literally paying for the privilege of frustrating the constituents it’s there to serve, that shifts the way that [leadership] looks at the problem.”. Step One: Prepare the document by extracting or exporting data from relevant backend systems.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan Casey is Vice President of Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics. He has twice been awarded Jessie H.
My best advice is to play the long game by building relationships,” said Carlos Rivero, Virginia’s former Chief Data Officer. They create friction between end users and the goals they want to achieve, whether that’s analyzing data or driving better decision-making. ” Download the e-book. 2 – Avoid easy fixes.
The State Department issued a record 24 million passport books and cards this year, setting an all-time record. The goal of TIES is to streamline how the agency shares cyber threat data with federal agencies, critical infrastructure groups and other partners. SSA has been under acting leadership since July 2021.
She is a go-getter with a unique skill set that includes in-depth technical expertise, experience with industry best practices, and exceptional leadership and management skills. There, he architected a Supervisory Control and Data Acquisition (SCADA) system to control the flow, processing and disposal of nuclear waste.
It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications. He has twice been awarded Jessie H.
Technologies such as digital twins, artificial intelligence (AI), edge and cloud computing, and open data can help islands ameliorate these challenges. Data-driven transport solutions such as MaaS face the challenge of scaling operations to accommodate growing demand for services and processing large amounts of data.
Book your group rate for CGP Fall Training Conference at the Residence Inn Marriott by clicking here. Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. miles away from the Fairview Park Marriott. miles away from the Residence Inn Marriott.
How do we protect federal data? After doing that for several years he moved into leadership in the InfoSec space and has been leading security teams in different capacities for the past 10 years. He developed analytical tools, data requirements, and system access needs in support of these missions.
More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors- who with a little compromised code began opening extremely hard to find doors to sensitive data. He has twice been awarded Jessie H.
In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. He has twice been awarded Jessie H.
Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. Under Roser’s leadership the experiment published ~450 refereed scientific papers.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content