Remove Books Remove Networking Remove Risk Management
article thumbnail

Using Data to Fortify Network Defense (E151)

FedInsider

As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, risk management, agency incident response plans, and programs. Cochran has also authored various technical works, including over 200 electronic and print articles and two books for publication.

article thumbnail

How GSA Secures Its Hybrid Workforce

GovLoop

Moving forward, GSA plans to improve user experiences through seamless global connections to agency-managed environments and applications while maintaining ZTA principles, including continuous verification of users, devices, applications and data. The agency also is making use of automation to enhance visibility across the GSA ecosystem.

IT 98
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Mobile Security – A Requirement for National Security (E166)

FedInsider

Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. Army War College.

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

Additionally, Mark helps clients understand where to start with zero trust and how to utilize security program management and security risk management to ensure continued success in the implementation of Zero Trust concepts. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.

article thumbnail

Facing the Challenges Artificial Intelligence Poses

FedInsider

In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications. OpenAI released ChatGPT in November 2022, and yet it already has evolved so much that it bears little resemblance to v.0.

article thumbnail

Emerging Technology Series: Cybersecurity

FedInsider

Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.