This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The explosive growth of Internet of Things devices has made development of edge infrastructure pivotal for real-time data analytics. As more data originates from various IoT devices and other sources that include industrial sensors — insights that enhance operations, customer experiences and safety measures — more can be processed.
As chief artificial intelligence officers take the helm to advance the many AI/ML initiatives now taking shape in every agency, new ideas and innovation — which only two or three years ago wouldn’t have seemed possible — are more welcome than ever.
To make the most of their AI investments, agencies need tools for managing machine learning models, governing and cleaning the data feeding into them, and adjusting them when new data becomes available.
An increasing number of agencies are cautiously considering artificial intelligence implementations, with multiple federal IT leaders sharing potential use cases at the ACT-IAC Emerging Technology & Innovation Conference this week.
Having a physical backup of your data, in addition to backups in the cloud or on unconnected servers, can provide an essential level of protection should hackers or malware freeze your information. It’s part of the 3-2-1 rule of backup: keep three copies of your data, use two different forms of media and keep one copy offsite.
Tuesday, October 10, 2023 | 2:00PM EDT | 1 Hour | Training Certificate The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. Department of Defense (DoD).
Having a completed checklist can give agencies a sense of security, but with today’s explosion of data and potential attack from an unexpected vector, have they been falsely “lulled into complacency?” And avoiding data hoarding to prevent hidden attack codes. To view this webinar: The Hard Truths of Data Security in the Public Sector.
Tune in now on your favorite Podcasting platform to hear our experts weigh in on which use cases can make this innovative technology sustainable and trustworthy. In this role, he leads the Agency’s IT innovation and AI programs, and is responsible for IT architecture and design. To view this webinar: Generative AI in Government.
As agencies move into this new era of AI-driven innovation — and original equipment manufacturers position themselves to meet growing demand — technology procurement decisions are taking on greater significance.
With data generation being on the ever-constant increase, new solutions to protect it are needed to keep up with the challenge. In this week’s episode of Fed At the Edge, we sit down with a veteran in data protection, Aaron Lewis – Head of Public Sector Sales, Engineering for Rubrik. Not all data is the same. Has it been tested?
Its Guardians watch for cyberattacks on satellites, collect data about potential adversarial actions and protect space-related activities. Lisa Costa, the force’s first chief technology and innovation officer (and former CIO for U.S. Special Operations Command), works…
Wednesday, June 26, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
CISAs new CDM Data Model Document(DMD) sets out the minimum set of data requirements needed to leverage the CDM solution to reduce every agencys threat surface, increase visibility into the federal cybersecurity posture, improve cybersecurity response capabilities, and streamline FISMA reporting.
Harnessing AI is a useful way to advance modernization goals, but AI governance—including ethical considerations, data security, and compliance with federal regulations—must remain a top priority. And increased AI implementation demand that organizations rethink how they staff, develop, and run their day-to-day operations.
Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan is VP, Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics.
It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. His portfolio included mobility, networks operations, cybersecurity, and innovation.
He has led numerous reviews of federal data center optimization and cloud computing, and was responsible for GAO’s work on the High-Risk area of Improving the Management of IT Acquisitions and Operations. He oversees audits on the IT and cybersecurity workforce, critical infrastructure protection, and the IRS’s IT modernization efforts.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan Casey is Vice President of Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics.
Karen Hay, Digital Health Transformation Lead for the Global Public Sector with Salesforce sums it up perfectly, “Generative AI can unlock the knowledge trapped in data.” This week on Feds At the Edge, we explore how this innovative technology can revolutionize the way our government runs.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
At a recent roundtable with The Manufacturer magazine, the benefits of cross functional collaboration for procurement was raised as a discussion point for the session. . By being able to import BoM data into Ivalua from a PLM or MRP system means that procurement has the capability to deliver value and truly collaborate with suppliers. .
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors- who with a little compromised code began opening extremely hard to find doors to sensitive data.
Acquisition is the primary way where the government gets access to the products and services that it needs to deliver on the mission, and it’s data driven process. 100% of acquisition, the heart of the smart modern acquisition is data. And we’ve done significant work over the last few years to get our data position strong.
Mangala also serves as the Director of Technology, Innovation and Engineering, responsible for overseeing the development and operations of the department’s Enterprise Data Platform and Artificial Intelligence and Machine Language strategies and policies.
Featured Speakers: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
Angelica Phaneuf, CISO with US Army Software Factory (formerly Kessel Run) known for their innovations, offers practical tips for deploying ZTA, emphasizing assembling a diverse toolkit for micro-segmentation success. This week on Feds At the Edge, we are breaking the system into tiny little pieces.
Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. He joined INL four years go.
In 2021, after 10 years of entrepreneurship, she joined Granicus as the Strategic Lead for CX and Innovation. Mary has extensive experience crafting data-driven digital and engagement programs using a combination of on- and off-line tactics and strategies. Prior work supported governments and community organizations in Rhode Island.
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
They’ll cover topics such as employee and constituent engagement, artificial intelligence, data use and literacy, cybersecurity, diversity and inclusion, and more. Air Force data security & compliance officer. Sandra is a best-selling author, podcast host and writes career coaching articles for Forbes and other industry magazines.
The defense and intelligence communities want to create more pathways for their former data scientists and other in-demand personnel to return to government and address the cybersecurity workforce shortage.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface Human Interaction: Learn the critical role humans play amid the new promises of AI Contingency Plans: If your agency was attacked today with ransomware, would you be able to identify your critical data?
Stretch focuses on identifying customers challenges and designing innovative cybersecurity solutions to solve their complex problems. Stretchs distinguished career serving in the United States Air Force has supported engineering solutions in theater, supporting both Operation Inherent Resolve (OIR) and Enduring Freedom Afghanistan.
Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI’s role in handling massive datasets, enhancing earth observation for accurate population counting, automating data ingestion, and metadata classification. Luke is currently working as the Chief Innovation Officer at the U.S.
Thursday, March 20, 2025 | 2:00PM EDT | 1 Hour | 1 CPE Within our energy agencies, the integration of AI, data, and cybersecurity is essential for advancing the technology modernization required for a stronger future.
Luke Keller, Chief Innovation Officer at US Census bureau, highlighted using NIST guidelines, including bias reduction frameworks, to ensure ethical and accurate AI deployment. Close Deputy Chief Innovation Officer, U.S. Luke is currently working as the Chief Innovation Officer at the U.S.
It is a challenging process; legacy technologies that never were designed to be integrated into the larger system, data silos, compliance requirements such as HIPAA, and cybersecurity risks all need to be addressed and modernized. Nasheb holds a dual masters degree in Computer Science and Data Science from Georgia Tech.
Quentin Kreilmann, Deputy Director for the Center for AI at Pacific Northwest National Laboratory, warns AI enthusiasts to proceed with caution when it comes to sensitive data. Ramesh Menon, CTO at DIA, provides us with the critical questions to ask in order to ensure fair and unbiased data.
Among the innovative ways agencies are responding to the ever-evolving threat landscape are expanded collaboration between federal and state/local agencies, initiatives such as Zero Trust to raise the security bar, and FedRAMP/StateRAMP vehicles to provide a uniform security baseline. Murphy, Ph.D. × × John B. Murphy, Ph.D.
Stretch focuses on identifying customers challenges and designing innovative cybersecurity solutions to solve their complex problems. Stretchs distinguished career serving in the United States Air Force has supported engineering solutions in theater, supporting both Operation Inherent Resolve (OIR) and Enduring Freedom Afghanistan.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content