This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Agencies looking to establish hybrid data centers need comprehensive security strategies that set realistic time frames and are mapped to their respective budgets. A hybrid data center relies on cloud, software-defined networking and virtualization technologies to distribute applications across physical and multicloud environments.
NASA has more programs today than at any time in the agency’s history, but budgets haven’t kept up. To streamline projects, keep track of data and prevent the need for rework, the agency’s teams leverage model-based systems engineering methodology.
Because if you tried to do it sequentially — maybe networks first, then data, then identity — it would take too much time.” Office of Management and Budget Memo M-22-09 requires them to meet zero-trust objectives by the end of fiscal year 2024. And for federal civilian agencies, the clock is ticking. That includes…
Those agencies also manage vast amounts of sensitive data while faced with challenges related to legacy systems, bureaucratic processes and budget constraints, so it can be difficult for them to maintain adequate cybersecurity defenses against identity-based attacks such as Kerberoasting.
With an annual budget exceeding $7 billion, the NCI funds investigative work in everything from cancer genomics to the disease’s detection, diagnosis and treatment. The NCI’s IT division, where Janelle Cortner is director of the Data Management and Analysis Program, is responsible for managing and securing much of the…
Federal IT leaders want to make it easier for agencies to incorporate artificial intelligence such as chatbots and image and code generators into daily workflows, as well as compliance tools that help protect sensitive data and users’ personal information.
Federal agencies have reported an average of about 30,000 cyber incidents annually for the past five years, according to data from the White House Office of Management and Budget.
Agencies must prioritize implementing Backup as a Service more efficiently in order to realize the full data storage and access benefits. While many BaaS providers offer to securely back up agencies’ data and apps in the cloud and let them pay for storage, agencies must be mindful of their budgets as well. Click the banner…
The Office of Management and Budget signaled a tipping point in the government’s embrace of artificial intelligence when it recently issued guidance to agencies on use of the emerging technology.
And these organizations are likely to face tight budgets and limited manpower to deal with a cyber threat. Thursday, January 11, 2024 | 2:00PM EST | 1 Hour | Training Certificate Recent headlines have been full of stories about state and local governments and school systems being targeted by malicious actors.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
He has led numerous reviews of federal data center optimization and cloud computing, and was responsible for GAO’s work on the High-Risk area of Improving the Management of IT Acquisitions and Operations. He oversees audits on the IT and cybersecurity workforce, critical infrastructure protection, and the IRS’s IT modernization efforts.
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.
At a recent roundtable with The Manufacturer magazine, the benefits of cross functional collaboration for procurement was raised as a discussion point for the session. . One of the most interesting suggestions is that a procurement team should take a service mindset when working with the budget holders within the organisation.
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
We had four keynote speakers and twenty training sessions based on a $40,000 budget. Three months before the event, the budget was cut to $10,000. In projects, “breathing” can be whatever stops the flow of resources to the project. I worked on a project to put on a training event.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
His past work has included a range of both strategic and technical roles at Results for America and the Sunlight Foundation as part of the What Works Cities initiative, which helps local governments improve people’s lives by using data and evidence effectively to tackle pressing challenges.
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
According to a document accompanying the Biden administration’s fiscal year 2023 budget request, the average age of a federal worker was 47 years in September 2021. An analysis of Office of Personnel Management data… Nearly 30 percent of the entire workforce was 55 or older; only 8 percent was younger than 30.
Tuesday, March 26, 2024 | 11:00AM EDT | 1 Hour | 1 CPE As agencies increasingly migrate their workloads to the cloud, it is crucial to understand the implications and benefits of writing natively to the cloud, which enables organizations to optimize their data protection strategies, streamline operations, and enhance overall security.
With potential cybersecurity budget decreases looming, agencies need an understanding of the data they’re trying to protect with a zero-trust security architecture, now more than ever. Civilian agencies have seen their cyber budgets grow an estimated 12 percent in fiscal year 2023, according to GovWin, a trend that is…
The Department of Homeland Security observed in its Zero Trust Implementation Strategy that agencies “can expect audits and budgets to hinge on questions of whether and how [they’ve] implemented zero trust for years to come.”
This is why all Federal agencies were directed by Executive Order 14028 and the follow-up Office of Management and Budget memo laying out a Zero Trust Strategy to implement a Zero Trust architecture by the end of September 2024. Wednesday, July 24, 2024 | 2:00PM EDT | 90 Minutes | 1.5
This is why all agencies were directed by Executive Order 14028 and the follow-up Office of Management and Budget memo laying out a Zero Trust Strategy to implement a Zero Trust architecture by the end of September 2024. Wednesday, July 24, 2024 | 2:00PM EDT | 90 Minutes | 1.5
Agencies must prepare for potential breaches with a cyber resilience plan to leverage robust data backup and recovery strategies, which enable speedy restoration of systems and data.
Agencies should embrace technologies that rely on modern, flexible data management systems to more efficiently and cost-effectively fulfill their missions while under increased budgetary pressure from the controversial, new Department of Government Efficiency (DOGE).
Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI’s role in handling massive datasets, enhancing earth observation for accurate population counting, automating data ingestion, and metadata classification. Census Bureau, where they are leading the advancement of data-driven services through emerging technologies.
Ryan Simpson, Engineering Chief Technologist for the Public Sector for NVIDIA, recommended tools like Retrieval-Augmented Generation to develop use cases which work with limited data and are easy to evaluate. Census Bureau, where they are leading the advancement of data-driven services through emerging technologies.
This week on Feds At the Edge , federal leaders offer their suggestions on managing this ever-evolving and complex landscape, with a focus on training, understanding data and leveraging cloud functions. His role included management of approximately 700 employees and 300 contractors and an annual operating budget of approximately $250 million.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content