This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
To properly assess risk, reduce carbon emissions and avoid ethics violations, leaders must map and assess the multi-tier supply chain. Supplier riskmanagement too often focuses on evaluating the risk level of each supplier and selecting lower risk ones when possible. Fortunately, we have what we need today.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Close CISO, U.S.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Close CISO, U.S.
Seasoned practitioners in public procurement can be jaded from situations that have gone wrong, and it is common for inexperienced public buyers to experience risk aversion and fear of the unknown. Additionally, a simplistic risk transfer strategy may reduce market interest, and the number of bids submitted.
We aim to deliver exceptional training and consulting in public sector procurement and contract management. From strategic planning and effective communication to ethical procurement and sustainability, we ensure our students develop a well-rounded skill set essential in today’s procurement landscape.
In his career, he has served as a subject matter expert on cybersecurity topics related to riskmanagement, incident response, cybersecurity analysis, and cyber policy. Key areas of interest include: Data Governance, Data Privacy, Ethical uses of AI and Machine Learning, and practical approaches to multicloud data sharing.
Williams, and Mickey Liebner; Mayer Brown Bipartisan, bicameral legislation in the US Congress would mandate the use of the National Institute of Standards and Technology’s (“NIST”) Artificial Intelligence RiskManagement Framework (“Framework”) by federal agencies. Both in-person and virtual attendance are offered for the course.
In fact, a recent study from Forrester Consulting commissioned by Ivalua identified only 13% of businesses as leaders when it comes to supplier management, defined by Forrester as having formal programs that are broadly applied across the supply base. Effective riskmanagement or improvement plans must include sub-tier suppliers.
Disruptions, ethical and compliance risks are more likely to occur deep in your supply chain. Can a system easily adopt to new processes or does it require changes to the vendor’s roadmap or costly consultants/customizations? That ensures accuracy, timeliness and better accessibility regardless of where a user is working.
During the training, Jason, Liam, and Alex will cover the following topics and more: Pricing – Transactional Data Reporting (TDR)/Commercial Sales Practices (CSP); Domestic Preferences; Supply Chain; Enforcement/Mandatory Disclosure/Ethics; Sustainability Requirements/Policy; and Bid Protests Update.
The UK Government has launched a public consultation that will run until 21 June 2023. Given the relevance of the issue, it can be expected that the public consultation will attract a large volume of submissions, and that the ‘pro-innovation approach’ will be heavily criticised.
After 20 years of service, Santina retired from the military and returned to the Texas Military Department as a civilian where she now serves as the agency’s Information Systems Security Manager (ISSM). Dave earned a master’s degree in business administration from the University of Arizona. She has held senior roles at the U.S.
In March 2024, the Office of Management and Budget (OMB) released a memo that provides more specific directions to agencies for compliance with the guidance outlined in the executive order. Our professional services teams can assist agencies in addressing their specific needs, ranging from consulting to implementation.
The Software Acquisition Guide for Government Enterprise Consumers was created by the Information and Communications Technology Supply Chain RiskManagement Task Force, a group co-led by CISA and industry representatives. To register, click here.
In identifying concerns for digital identity riskmanagement, NIST focuses on three main concerns: identity proofing, authentication, and federation level. Organizations using AI and ML systems must implement the NIST AI RiskManagement Framework to evaluate risks and must consult SP1270 for managing bias in AI.
After 20 years of service, Santina retired from the military and returned to the Texas Military Department as a civilian where she now serves as the agency’s Information Systems Security Manager (ISSM). Dave earned a master’s degree in business administration from the University of Arizona. She has held senior roles at the U.S.
Coalition Consults” on VA Contracting Programs The Coalition is proud to offer our latest new resource for our healthcare members, called Coalition Consults. The first set of consults address key contracting programs at the US Department of Veterans Affairs (VA) for medical/surgical supply and medical device companies.
For instance, when a consultant possesses unique expertise and specialized knowledge based on their individual talent or creativity, sole source procurement can be justified. Therefore, procurement teams must implement strategies to manage these risks effectively.
The AISIC will develop guidelines for “red-teaming, capability evaluations, riskmanagement, safety and security, and watermarking synthetic content,” and will be housed within the U.S. SIZ-6208 (2023 ); Size Appeal of Odyssey System Consulting Group , Ltd. , AI Safety Institute. SIZ-6258 (2023). [5] SIZ-6178 (2022). [7]
Section 2(g) refers to AI riskmanagement, and states that It is important to manage the risks from the Federal Government’s own use of AI and increase its internal capacity to regulate, govern, and support responsible use of AI to deliver better results for Americans. Section 10.1(b) Section 10.1(b) Section 10.1(b)
After 20 years of service, Santina retired from the military and returned to the Texas Military Department as a civilian where she now serves as the agency’s Information Systems Security Manager (ISSM). Dave earned a masters degree in business administration from the University of Arizona.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content