This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
No longer trying to define what it is, focus is now on the affordability within already challenged budgets. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. Agencies have matured in their understanding of zero trust.
In the face of new and growing threats many federal, state and local IT budgets stay the same, however. The challenge becomes how to plan and implement a zero trust environment within budgets that are slow to increase. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity.
In the face of new and growing threats many federal, state and local IT budgets stay the same, however. The challenge becomes how to plan and implement a zero trust environment within budgets that are slow to increase. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity.
Administrators use their years of experience to plan within budget cycles. Leadership approval must be sought, and officials must be apprised of progress. Federal IT modernization is often a many-headed creature. Expert technologists must determine the requirements for an IT refresh.
And these organizations are likely to face tight budgets and limited manpower to deal with a cyber threat. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. He has twice been awarded Jessie H.
It has been almost two years since the Office of Management and Budget issued its federal zero trust architecture strategy, which set out specific goals for agencies to achieve by the end of fiscal year 2024. Prior to joining HHS, La Monte worked in various cybersecurity leadership roles including CISO of Headquarters, U.S.
He brings a strong background in public and private IT management and leadership. His leadership and skill in transforming organizations have made him an effective change agent within IT. His role included management of approximately 700 employees and 300 contractors and an annual operating budget of approximately $250 million.
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. He has twice been awarded Jessie H.
The author of numerous trade journal and online magazine articles, he is CISM (Certified Information Security Manager) and PMP (Project Management Professional) certified. Army providing leadership in cybersecurity, wide area networks, data centers, and IT. He leads the Network Operations, Cybersecurity, and Outside Plant functions.
Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations.
They have impressive government and industry experience and will cover topics such as IT; diversity, equity and inclusion; workforce management; process improvement; leadership; career building; and customer experience, to name just a few. Moffat is a mom, civil servant, community volunteer, and leadership coach.
We had four keynote speakers and twenty training sessions based on a $40,000 budget. Three months before the event, the budget was cut to $10,000. In projects, “breathing” can be whatever stops the flow of resources to the project. I worked on a project to put on a training event. Patent and Trademark Office.
It has been almost two years since the Office of Management and Budget issued its federal zero trust architecture strategy, which set out specific goals for agencies to achieve by the end of fiscal year 2024. He has twice been awarded Jessie H.
At a recent roundtable with The Manufacturer magazine, the benefits of cross functional collaboration for procurement was raised as a discussion point for the session. . One of the most interesting suggestions is that a procurement team should take a service mindset when working with the budget holders within the organisation.
The author of numerous trade journal and online magazine articles, he is CISM (Certified Information Security Manager) and PMP (Project Management Professional) certified. Army providing leadership in cybersecurity, wide area networks, data centers, and IT. He leads the Network Operations, Cybersecurity, and Outside Plant functions.
He brings a strong background in public and private IT management and leadership. His leadership and skill in transforming organizations have made him an effective change agent within IT. His role included management of approximately 700 employees and 300 contractors and an annual operating budget of approximately $250 million.
In August of that year, the Office of Management and Budget issued Memorandum 21-31 setting specific requirements for agencies to meet, for which the Cybersecurity and Infrastructure Security Agency (CISA) issued guidance regarding implementation. He has twice been awarded Jessie H.
The Department of Homeland Security observed in its Zero Trust Implementation Strategy that agencies “can expect audits and budgets to hinge on questions of whether and how [they’ve] implemented zero trust for years to come.” He has twice been awarded Jessie H.
This is why all Federal agencies were directed by Executive Order 14028 and the follow-up Office of Management and Budget memo laying out a Zero Trust Strategy to implement a Zero Trust architecture by the end of September 2024. Wednesday, July 24, 2024 | 2:00PM EDT | 90 Minutes | 1.5 He has twice been awarded Jessie H.
This is why all agencies were directed by Executive Order 14028 and the follow-up Office of Management and Budget memo laying out a Zero Trust Strategy to implement a Zero Trust architecture by the end of September 2024. Wednesday, July 24, 2024 | 2:00PM EDT | 90 Minutes | 1.5 He has twice been awarded Jessie H.
Her journey began as a Program Analyst and evolved through various roles, including senior staff positions and management and executive leadership roles in multiple divisions within the Office of Nuclear Reactor Regulation and the Office of Nuclear Materials Safety and Safeguards. He has twice been awarded Jessie H.
Her journey began as a Program Analyst and evolved through various roles, including senior staff positions and management and executive leadership roles in multiple divisions within the Office of Nuclear Reactor Regulation and the Office of Nuclear Materials Safety and Safeguards. He has twice been awarded Jessie H.
He brings a strong background in public and private IT management and leadership. His leadership and skill in transforming organizations have made him an effective change agent within IT. His role included management of approximately 700 employees and 300 contractors and an annual operating budget of approximately $250 million.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content