This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Securities & Exchange Commission Wilbert Vaughn × Wilbert Vaughn CDM Program Branch Chief Wil Vaughn has been in the information Technology business for over 30 years; first as a software programmer, a Senior ProjectManager, now as a Cyber Security IT Specialist.
Prior to DOE and his pursuit of public service, Dr. Kusnezov had a long career in academia where he published more than 100 articles and edited two books. Singh is passionate about process and projectmanagement. The critical thread across roles is Program, Process and ProjectManagement.
The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Air Force Reserves. As a Cyber Leader in the U.S
Cindi is the founding President of Women in Security – Kansas City 501c(3), was honored in SC Media magazine’s “Women to Watch in Cyber Security”, and was also featured in Cybersecurity Venture’s book, “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime.”
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
By leveraging Workspace tools like Google Docs and Sheets, UNOPS has streamlined projectmanagement and data handling and significantly reduced operational friction while enhancing user experience. We aim to break the data silos.
He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and ProjectManagement Professional (PMP) certifications.
His past work has included a range of both strategic and technical roles at Results for America and the Sunlight Foundation as part of the What Works Cities initiative, which helps local governments improve people’s lives by using data and evidence effectively to tackle pressing challenges.
As the largest city in the United States, New York City has its own technology roadmap , focusing on universal broadband access, improving online service delivery, and using data to advance data-driven operations. And both the state and the city have open data portals to provide accessibility, transparency, and accountability.
Discussing, costing, and contractually sharing risk “opens the books” and explores the genuine costs associated with owning and operating a business. It involves honest discussions about what can happen when things go wrong and developing processes to manage those things.
A member of the Senior Executive Service of the Federal Government, La Monte holds a Bachelor of Science in Liberal Arts with a focus in Management from Excelsior College, a Master of Science in Cybersecurity from Webster University, and a Master of Science in Information Assurance from Strayer University. He joined INL four years go.
Close Publisher, FedInsider Joe Dabrowski × Joe Dabrowski Regional Vice President, SLED Joe leads America’s State, Local and Education Sales organization at Rubrik, working with SLED customers around the country on leveraging the Rubrik Data Security platform to drive cyber resiliency. Murphy, Ph.D. × × John B.
Modisette has a bachelor’s degree in computer science and a master’s degree in information systems security management and a graduate certificate in projectmanagement. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
CPE In 2023, 725 data breaches were reported to the Department of Health and Human Services, according to HIPAA Journal. CPE credit in Business Management & Organization.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. Wednesday, August 28, 2024 | 2:00PM EDT | 90 Minutes | 1.5
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization.
Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface Human Interaction: Learn the critical role humans play amid the new promises of AI Contingency Plans: If your agency was attacked today with ransomware, would you be able to identify your critical data?
Wednesday, November 1, 2023 | 1:00PM EDT | 2 Hours | Training Certificate Ever since the dawn of the internet, its value lies in the data it handles, whether moving it, storing it, or calculating with it. and state agencies’ data because they need the money. Even hostile nation-states such as North Korea seek U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content