Remove Books Remove Data Remove Project Management
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Securities & Exchange Commission Wilbert Vaughn × Wilbert Vaughn CDM Program Branch Chief Wil Vaughn has been in the information Technology business for over 30 years; first as a software programmer, a Senior Project Manager, now as a Cyber Security IT Specialist.

article thumbnail

Applying AI to Advance Agency Missions

FedInsider

Prior to DOE and his pursuit of public service, Dr. Kusnezov had a long career in academia where he published more than 100 articles and edited two books. Singh is passionate about process and project management. The critical thread across roles is Program, Process and Project Management.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement.

article thumbnail

Cyber Attacks are Just as Damaging as Natural Disasters

FedInsider

Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Air Force Reserves. As a Cyber Leader in the U.S

article thumbnail

Harnessing AI for Stronger Cybersecurity

FedInsider

Cindi is the founding President of Women in Security – Kansas City 501c(3), was honored in SC Media magazine’s “Women to Watch in Cyber Security”, and was also featured in Cybersecurity Venture’s book, “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime.”

Media 97
article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.

article thumbnail

Breaking silos worldwide; how Google Cloud is fueling public sector AI, collaboration and innovation

FedScoop

By leveraging Workspace tools like Google Docs and Sheets, UNOPS has streamlined project management and data handling and significantly reduced operational friction while enhancing user experience. We aim to break the data silos.