Remove Budget Remove Data Remove White Paper
article thumbnail

After an Attack: Cyber Recovery Best Practices for State & Local Agencies

FedInsider

And these organizations are likely to face tight budgets and limited manpower to deal with a cyber threat. For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.

article thumbnail

Cloud Architecture Matters: Improve Cloud Security by Writing Natively to the Cloud (E165)

FedInsider

He has led numerous reviews of federal data center optimization and cloud computing, and was responsible for GAO’s work on the High-Risk area of Improving the Management of IT Acquisitions and Operations. He oversees audits on the IT and cybersecurity workforce, critical infrastructure protection, and the IRS’s IT modernization efforts.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

The Department of Homeland Security observed in its Zero Trust Implementation Strategy that agencies “can expect audits and budgets to hinge on questions of whether and how [they’ve] implemented zero trust for years to come.”

article thumbnail

Pentagon IG not impressed by effectiveness of DoD vendors’ award fees

Federal News Network

Auditors said without solid data, it’s hard to determine whether those award fees do much good. ( White papers are due by March 7, and winners will be announced on August 23. The IG also found problems with the Pentagon’s system for tracking those award-fee contracts.

article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.

article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.