This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
From inventory management to customer shipping, leave nothing to chance when it comes to supply chain risks. With that in mind, let’s take a look at how supplier riskmanagement can benefit your business and prevent the disruption of services. Understanding Supplier RiskManagement. Consider this.
Featured Speakers: Martin Stanley × Martin Stanley AI & Cybersecurity Researcher Martin Stanley, AI and Cybersecurity Researcher, leads the NIST AI RiskManagement Framework (AI RMF) efforts at the U.S. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
Close Deputy CIO & CISO, Argonne National Laboratory Michael Duffy × Michael Duffy Division Associate Director, Cybersecurity Michael Duffy is the Associate Director for Capacity Building within the Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Division.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Close CISO, U.S.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Close CISO, U.S.
Jones is responsible for all Agency IT systems and personnel, as well as the global communications network. Prior to joining the Treasury in 2016, Sarah Nur held numerous leadership positions in systems engineering, IT network deployment (worldwide), and operational cybersecurity supporting public and private organizations.
She is an Emergency Management PIO and a member of the Governor’s Committee on Disability Issues and Employment. Jerry Cooney, “Jer” to his friends, has spent his career serving in various capacities within Human Resources and Talent Acquisition.
The AI WP also stresses how ‘[w] hile some regulators already work together to ensure regulatory coherence for AI through formal networks like the AI and digital regulations service in the health sector and the Digital Regulation Cooperation Forum (DRCF), other regulators have limited capacity and access to AI expertise.
In March 2024, the Office of Management and Budget (OMB) released a memo that provides more specific directions to agencies for compliance with the guidance outlined in the executive order. Enabling agencies to build and strengthen AI governance Robust governance is the foundation upon which responsible AI initiatives must be built.
Discussions took place regarding the need to increase Congressional capacity. Increase capacity of current Congressional committees, as they already have subject-matter expertise. The five witnesses agreed that Congress’ current structure is not set up to review the rules coming out of the Executive branch.
This is an area where government agencies can begin to explore the impact that AI and other tools can have in driving improved customer and employee experiences while thoughtfully balancing human interaction, automation, and riskmanagement. Barbara joined VA in 2006 as a Staff Attorney at the Board of Veterans’ Appeals (Board).
As we bid farewell to Tom in his professional capacity, the Coalition extends our heartfelt gratitude for his years of service and wish him all the best in his well-deserved retirement. Network with peers from government and industry. His commitment, wisdom, and passion have left a lasting impact on our organization. PRISM has a $1.8
The AISI will create evaluation tools, test AI models and safeguards, issue guidance on AI safety and riskmanagement, and conduct technical research. Manufacturing USA is a “national network of institutes that brings together people, ideas, and technology to solve advanced manufacturing challenges.” manufacturers.
Agriculture Interim guidance distributed in October 2023 prohibits employee or contactor use in official capacity and on government equipment. A March risk determination by the agency rated ChatGPT’s risk as “high.” ChatGPT and similar software are not available on the VA network.
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. lacks capacity in vital areas, such as precision-guided munitions and microelectronics.
To ensure the protection of critical infrastructure, heads of Sector RiskManagement Agencies are also directed to assess AI risks related to critical failures, physical attacks, and cyber-attacks. The EO seeks to promote AI innovation and combat risks to developers. To do so, the Secretary of Commerce and U.S.
The private sector should follow the government’s model in preparing its own network and systems for our postquantum future,” states the National Cybersecurity Strategy. This article appeared in our guide, “The 2024 Cyber Agenda.”
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the impact of EO 13990, the changes in the threat landscape that require new thinking about resilience, and how agencies can plan ahead to build resilience capacity as risks expand.
In his capacity within the Commissioned Corps of the US Public Health Service, CDR Christl had deployed to public health disaster responses on numerous occasions including COVID-19, Hurricanes Irma and Maria, and to the Monrovia Medical Unit Ebola Treatment Unit outside of Monrovia, Liberia. pharmaceutical supply chain.
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. Government to mitigate risks. These agencies control 98 percent of all Federal real estate.
The threat from near-peer adversaries and other bad actors has made cybersecurity and supply chain riskmanagement fundamental to federal procurement and the commercial sector. As such, they are well-aware of the challenges involved in addressing vulnerabilities in the federal software supply chain. billion in funding.
& former CISO for the CIA Cast Study: Brownsville, Texas Jorges Cardenas × Jorges Cardenas IT Director & Chief Information Officer Jorge has over 20 years of experience in cyber & Network Security and building IT Infrastructures for the US Military and Department of Defense. Certificates will be e-mailed to registrants.
Agencies & industry partners discuss how to modernize outdated infrastructure & secure networks with the rise of advanced technologies & a changing threat landscape. He has over 25 years of industry experience in IT networking, cyber security, and data center design and implementation. Public Sector West for Fortinet.
Deep Learning – the use of large multi-layer ( artificial) neural networks that compute with continuous (real number) representations, similar to the hierarchically organized neurons in human brains. (see The AI brain works through the use of “ Neural Networks ”. The neural networks take in an input and generate an output.
It is based within the Joint Research Centre but also works with the EU’s Directorate-General for Communications Networks, Content and Technology, which can send ECAT requests. The second was related to an industry that changes amazingly fast, thus requiring high capacity to adapt,” another ECAT staffer cautioned. Several U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content