This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this capacity, he oversees staff who manage critical functions such as 24/7 Incident Detection Response, Threat Management, Threat Intelligence, Vulnerability Management, and Security Architecture / Engineering for the enterprise. Department of Labor. He is certified as both a scrum master and product owner.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Close CISO, U.S.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Close CISO, U.S.
This forum brings together CISOs from the financial sector, including banking institutions and regulators, to exchange cybersecurity information, collaborate on best practices and common Cyber initiatives, engage in vulnerability and threat management, and discuss incident handling. Marsh is a retired U.S.
Close Deputy CIO & CISO, Argonne National Laboratory Michael Duffy × Michael Duffy Division Associate Director, Cybersecurity Michael Duffy is the Associate Director for Capacity Building within the Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Division.
Looking ahead, the panel discussed upcoming trade trends, such as the growing role of sustainability and carbon credits, Latin American companies expanding into Asia, opportunities arising from US-China tensions, India’s potential in services, and the importance of adaptability and riskmanagement in international trade.
In March 2024, the Office of Management and Budget (OMB) released a memo that provides more specific directions to agencies for compliance with the guidance outlined in the executive order. Enabling agencies to build and strengthen AI governance Robust governance is the foundation upon which responsible AI initiatives must be built.
Additionally, the task force offered 10 recommendations throughout the federal government for “further increasing AI capacity.” The guidance states that FNS will work with SLTTs for riskmanagement, and lays out four categories of risk for AI usage in regard to the service, ranging from low to high.
This is an area where government agencies can begin to explore the impact that AI and other tools can have in driving improved customer and employee experiences while thoughtfully balancing human interaction, automation, and riskmanagement. Barbara joined VA in 2006 as a Staff Attorney at the Board of Veterans’ Appeals (Board).
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. Government to mitigate risks. These agencies control 98 percent of all Federal real estate.
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. lacks capacity in vital areas, such as precision-guided munitions and microelectronics.
This resulted in hiring more than 6,000 engineers, program managers, contracting and grants management specialists needed to execute those programs. She is an Emergency Management PIO and a member of the Governor’s Committee on Disability Issues and Employment.
Joseph Ronzio, Deputy Chief Health Technology Officer, Veterans Health Administration, talks about the risks of blind patching and the benefits of a hybrid approachcombining automation with manual oversight. To view this webinar: Bringing Automation to Cloud RiskManagement. Brian “Stretch” Meyer, Sr.
To ensure the protection of critical infrastructure, heads of Sector RiskManagement Agencies are also directed to assess AI risks related to critical failures, physical attacks, and cyber-attacks. The EO seeks to promote AI innovation and combat risks to developers. To do so, the Secretary of Commerce and U.S.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the impact of EO 13990, the changes in the threat landscape that require new thinking about resilience, and how agencies can plan ahead to build resilience capacity as risks expand.
In his capacity within the Commissioned Corps of the US Public Health Service, CDR Christl had deployed to public health disaster responses on numerous occasions including COVID-19, Hurricanes Irma and Maria, and to the Monrovia Medical Unit Ebola Treatment Unit outside of Monrovia, Liberia. pharmaceutical supply chain.
Close Chief Information Officer, Texas Department of Agriculture Gabe Perez × Gabe Perez Vice President, Systems Engineering Gabe Perez is Vice President of Systems Engineering, U.S. Close Vice President, Systems Engineering, U.S. Chris enjoys sharing technical expertise to help people utilize technology for enablement.
At the CIA, Mestrovich led the Agency’s cyber defense operations, developing and implementing cyber security regulations and standards, and directed the evaluation and engineering of cyber technologies. Before Mestrovich’s career in the public sector, he was a systems engineer at Cisco Systems and served in the U.S.
Photo credit: Joint Research Centre The employees at ECAT help the European Commission fulfill its responsibilities to oversee very large online platforms, or VLOPs , and very large online search engines, or VLOSEs. We [also] need to have methodologies that can be applied at the policy side.” Several U.S. government.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content