This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
Under this contract, IBM will cover planning, authorizing, booking and vouchering for travel expenses for ETSNext. GSA expects the next-generation platform will allow enable federal employees to easily plan and book travel reservations online and be reimbursed in an automated manner.
Wednesday, April 3, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems.
Lumen Technologies has booked a task order valued at over $73.6 Under the award, Lumen will support the office’s goal to help Congress and the public by upgrading its network, data and voice connectivity , the company announced from Washington, D.C. million from the Government Accountability Office. on Thursday.
Tuesday, August 20, 2024 | 2:00PM EDT | 1 Hour | 1 CPE As agencies face unprecedented data volumes and velocity, managing the speed and size of the data flow efficiently becomes a significant challenge , especially with the growing use of AI-based analytics.
Tuesday, October 10, 2023 | 2:00PM EDT | 1 Hour | Training Certificate The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. As a Cyber Leader in the U.S
Thursday, January 18, 2024 | 2:00PM EST | 1 Hour | Training Certificate State and local governments and education produce large amounts of unstructured data in a wide range of data types. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educational and government operations.
Lynker has booked a five-year, $125 million task order the National Oceanic and Atmospheric Administration awarded under the Professional, Scientific and Technical Services Oceans Domain indefinite-delivery/indefinite-quantity contract. As part of
Andrew Manos, Director, Commercial Services for True Zero Technologies, suggests that, given today’s data volume, centralizing data is essential. To view this webinar: How to Fight Threats to the Software Supply Chain. Department of Defense.
Army Program Executive Office for Intelligence, Electronic Warfare and Sensors to advance the Integrated Sensor Architecture program to help enable seamless sensor data sharing across battlefield networks.
Having a completed checklist can give agencies a sense of security, but with today’s explosion of data and potential attack from an unexpected vector, have they been falsely “lulled into complacency?” And avoiding data hoarding to prevent hidden attack codes. To view this webinar: The Hard Truths of Data Security in the Public Sector.
As Forbes describes it, “Traditional AI systems are primarily used to analyze data and make predictions, while generative AI goes a step further by creating new data similar to its training data.” In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Certificates will be e-mailed to registrants.
As education continues to evolve, data-driven decision making is a powerful strategy to transform teaching and learning practices and unlock new opportunities for student success. Lessonbee’s whole-school wellness solution provides data to help teachers improve student self-efficacy and well-being.
With data generation being on the ever-constant increase, new solutions to protect it are needed to keep up with the challenge. In this week’s episode of Fed At the Edge, we sit down with a veteran in data protection, Aaron Lewis – Head of Public Sector Sales, Engineering for Rubrik. Not all data is the same. Has it been tested?
data centers, crucial for safeguarding the Federal Aviation Administration’s infrastructure. Under the contract, Iridium will supply its satellite time and location service to over 36 L3Harris-operated communications network backbone nodes and a similar number of FAA facilities.
Prior to DOE and his pursuit of public service, Dr. Kusnezov had a long career in academia where he published more than 100 articles and edited two books. In his career, Delmolino has assisted clients in the application of leading edge data management and software development productivity solutions.
Wednesday, June 26, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
This excellent book discusses the many smart, sensible ways of dealing with emergency procurement. The UK bought too much, too fast We’re currently gathering and analysing all the data comparing the UK to its major European peers to present to the Covid-19 Public Inquiry. Transparency and data on who has got supplies really matters.
In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications. Certificates will be e-mailed to registrants. Those titles, Exploring Microsoft Office and Guide to Webcams enjoyed both commercial success and reviewer acclaim.
CISAs new CDM Data Model Document(DMD) sets out the minimum set of data requirements needed to leverage the CDM solution to reduce every agencys threat surface, increase visibility into the federal cybersecurity posture, improve cybersecurity response capabilities, and streamline FISMA reporting.
Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter – suddenly the systems had to become decentralized, distributed and open to remote workers.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
He has over 20 years of technology consulting experience in the areas of data visualization, geospatial analytics, data management, and data science. In his role, Kyle builds teams that use data to create innovative solutions to difficult business challenges.
It’s likely to be the largest breach the sector has ever faced, disrupting billions in payments to doctors and hospitals, and potentially exposing the personal data of one-in-three Americans,” Modern Healthcare reported. This “cyberattack … paralyzed much of the US healthcare system.
It’s likely to be the largest breach the sector has ever faced, disrupting billions in payments to doctors and hospitals, and potentially exposing the personal data of one-in-three Americans,” Modern Healthcare reported. This “cyberattack … paralyzed much of the US healthcare system.
Sev1Tech has been awarded a $188 million contract by the Space Systems Command’s Tactical C3 Acquisition Delta to expand the meshONE-Terrestrial network.
Harnessing AI is a useful way to advance modernization goals, but AI governance—including ethical considerations, data security, and compliance with federal regulations—must remain a top priority. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes.
He has led numerous reviews of federal data center optimization and cloud computing, and was responsible for GAO’s work on the High-Risk area of Improving the Management of IT Acquisitions and Operations. He has co-authored three books and has a patent pending for supply chain assurance using Blockchain technology. grandchildren.
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.
This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
This week we’re diving right in with data, more specifically the expanded cyber landscape full of personal data malicious actors gained easier access to as the workforce transitioned into remote working. We will also address the double-edge sword of automation.
From Pepsi Bottling Ventures to the American Red Cross, no one is safe from cyber-attacks, as these two organizations are just two in a long list of organizations that have recently dealt with network breaches and the loss of sensitive data. An example of how this is helpful comes from the U.S. Favorite
Berman served as an organization development psychologist and consultant for the VHA National Center for Organization Development where she provided data-driven OD services at all levels of VHA. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
For our project, we compared green criteria against real tender notices, using data from the European Union and the Dominican Republic. There are many more tasks to which AI can be applied, and the inputs and outputs can be almost any kind of data: text, numbers, images, audio, video and/or datatables.
According to the Federal Bureau of Investigation, ransomware is “a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.” To prevent service outages and debilitating data loss, your agency needs to increase its resilience.
Why we need to talk about RAG and LLMs With the digital era in full swing, staying informed and leveraging current data is no longer a luxury—it’s a necessity. Bridging the knowledge gap with LLMs Imagine if every government employee had an assistant who had read every book, document, and memo in the world.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan is VP, Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics.
Facilitating Data-Sharing. Across the Corps’ diverse missions, data is the key ingredient, and making that data both accessible and secure is the “ultimate goal” of the zero-trust effort, he said. Through leveraging zero-trust principles, we’re looking to … share access to data in a secure manner. Get the e-book.
Cindi is the founding President of Women in Security – Kansas City 501c(3), was honored in SC Media magazine’s “Women to Watch in Cyber Security”, and was also featured in Cybersecurity Venture’s book, “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime.”
At the keynote, Kim Jackson, head of nonprofits at Amazon Web Services (AWS) Australia, and Mitchell Kelly, head of engagement for Australia and New Zealand at AWS, highlighted how nonprofits are on the front lines of addressing some of society’s greatest needs, and how harnessing the power of data can be a force multiplier for change.
Featuring layered security architecture, high-speed and low-latency networks, and business continuity with full disaster recovery within 4 hours, CSS’s Common Securitization Platform (CSP) is integral in supporting the financial services industry.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content