This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Tuesday, October 10, 2023 | 2:00PM EDT | 1 Hour | Training Certificate The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. Department of Defense (DoD).
Tune in now on your favorite Podcasting platform to hear our experts weigh in on which use cases can make this innovative technology sustainable and trustworthy. In this role, he leads the Agency’s IT innovation and AI programs, and is responsible for IT architecture and design. To view this webinar: Generative AI in Government.
Having a completed checklist can give agencies a sense of security, but with today’s explosion of data and potential attack from an unexpected vector, have they been falsely “lulled into complacency?” And avoiding data hoarding to prevent hidden attack codes. To view this webinar: The Hard Truths of Data Security in the Public Sector.
With data generation being on the ever-constant increase, new solutions to protect it are needed to keep up with the challenge. In this week’s episode of Fed At the Edge, we sit down with a veteran in data protection, Aaron Lewis – Head of Public Sector Sales, Engineering for Rubrik. Not all data is the same. Has it been tested?
Wednesday, June 26, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems.
CISAs new CDM Data Model Document(DMD) sets out the minimum set of data requirements needed to leverage the CDM solution to reduce every agencys threat surface, increase visibility into the federal cybersecurity posture, improve cybersecurity response capabilities, and streamline FISMA reporting.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
Harnessing AI is a useful way to advance modernization goals, but AI governance—including ethical considerations, data security, and compliance with federal regulations—must remain a top priority. And increased AI implementation demand that organizations rethink how they staff, develop, and run their day-to-day operations.
Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan is VP, Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics.
It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. His portfolio included mobility, networks operations, cybersecurity, and innovation.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan Casey is Vice President of Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics.
He has led numerous reviews of federal data center optimization and cloud computing, and was responsible for GAO’s work on the High-Risk area of Improving the Management of IT Acquisitions and Operations. He oversees audits on the IT and cybersecurity workforce, critical infrastructure protection, and the IRS’s IT modernization efforts.
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Mr. Bishop recently joined the Department of the Air Force to drive cybersecurity innovation.
Mangala also serves as the Director of Technology, Innovation and Engineering, responsible for overseeing the development and operations of the department’s Enterprise Data Platform and Artificial Intelligence and Machine Language strategies and policies.
The world of manufacturing is quickly evolving, driven by production modernization, materials innovation, big data, and a new type of workforce. Mastery of big data will determine who rises to the top in terms of financial performance. It’s time to add some data experts to your teams. Collaboration skills.
More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors- who with a little compromised code began opening extremely hard to find doors to sensitive data.
In fact, data from YouGovAmerica suggests that about a quarter of Americans will make resolutions, and 20% think they'll accomplish them. It’s about “creating the platform for change”— that is, finding more cost-effective, innovative approaches to delivering IT and improving service to the citizen.
And what of the data that is the “fuel” powering AI? How is that data validated and being used to avoid bias? A host of recent studies have identified the shrinking industrial base serving the federal government and the corresponding impact on competition, innovation, and costs. Multiple Award Schedule (MAS) Price Evaluation.
Angelica Phaneuf, CISO with US Army Software Factory (formerly Kessel Run) known for their innovations, offers practical tips for deploying ZTA, emphasizing assembling a diverse toolkit for micro-segmentation success. This week on Feds At the Edge, we are breaking the system into tiny little pieces.
However, its findings are sufficiently worrying as to require a much more robust policy intervention that the proposals in the recently released WhitePaper ‘AI regulation: a pro-innovation approach’ ( for discussion, see here ).
Increased outsourcing has made businesses increasingly dependent on suppliers to drive innovation. A recent study by Forrester found that the single greatest factor in increasing a supplier’s willingness to collaborate with and share innovations with a customer was timeliness of and visibility into payments.
And what of the data that is the “fuel” powering AI? How is that data validated and being used to avoid bias? A host of recent studies have identified the shrinking industrial base serving the federal government and the corresponding impact on competition, innovation, and costs. Multiple Award Schedule (MAS) Price Evaluation.
Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. He joined INL four years go.
It will collaborate with existing organisations within government, academia, civil society, and the private sector to avoid duplication, ensuring that activity is both informing and complementing the UK’s regulatory approach to AI as set out in the AI Regulation whitepaper’.
Swimming against the tide, and seeking to diverge from the EU’s regulatory agenda and the EU AI Act , the UK announced a light-touch ‘pro-innovation approach’ in its July 2022 AI regulation policy paper. The ‘pro-innovation approach’ in the GCSA Report — squaring the circle?
Karen Hay, Digital Health Transformation Lead for the Global Public Sector with Salesforce sums it up perfectly, “Generative AI can unlock the knowledge trapped in data.” This week on Feds At the Edge, we explore how this innovative technology can revolutionize the way our government runs.
Auditors said without solid data, it’s hard to determine whether those award fees do much good. ( DHS sets ‘aggressive’ recruiting strategy to fill AI jobs - Federal News Network) The Army is looking for international innovators to share their novel technology solutions.
According to Miller, “the goal is to make sure that we have access to new ideas as quickly as possible so we can bring [small businesses] in and drive innovation through the defense industrial base.” Ethical concerns about the uses of AI for healthcare and how veteran data is being used were expressed by lawmakers. cloud providers. [1]
While some agencies in the public sector have pumped the breaks on the use of generative artificial intelligence, the Federal Reserve System has set up a generative AI incubator, looking to be “bold” but responsible in its use of the technology, according to the agency’s chief innovator.
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. At Janes, Ben is responsible for creating a culture of innovation and is responsible for developing new products.
Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface Human Interaction: Learn the critical role humans play amid the new promises of AI Contingency Plans: If your agency was attacked today with ransomware, would you be able to identify your critical data?
Stretch focuses on identifying customers challenges and designing innovative cybersecurity solutions to solve their complex problems. Stretchs distinguished career serving in the United States Air Force has supported engineering solutions in theater, supporting both Operation Inherent Resolve (OIR) and Enduring Freedom Afghanistan.
Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI’s role in handling massive datasets, enhancing earth observation for accurate population counting, automating data ingestion, and metadata classification. Luke is currently working as the Chief Innovation Officer at the U.S.
Thursday, March 20, 2025 | 2:00PM EDT | 1 Hour | 1 CPE Within our energy agencies, the integration of AI, data, and cybersecurity is essential for advancing the technology modernization required for a stronger future.
It is a challenging process; legacy technologies that never were designed to be integrated into the larger system, data silos, compliance requirements such as HIPAA, and cybersecurity risks all need to be addressed and modernized. Nasheb holds a dual masters degree in Computer Science and Data Science from Georgia Tech.
This new technology will modernize legacy systems at the IRS, highlighting the opportunities for innovation that generative AI provides. Reza Rashidi × Reza Rashidi Director, Research Applied Analytics & Statistics Reza Rashidi is the Director, IRS, Research Applied Analytics & Statistics (RAAS) Data Management Division (DMD).
Luke Keller, Chief Innovation Officer at US Census bureau, highlighted using NIST guidelines, including bias reduction frameworks, to ensure ethical and accurate AI deployment. Close Deputy Chief Innovation Officer, U.S. Luke is currently working as the Chief Innovation Officer at the U.S.
Quentin Kreilmann, Deputy Director for the Center for AI at Pacific Northwest National Laboratory, warns AI enthusiasts to proceed with caution when it comes to sensitive data. Ramesh Menon, CTO at DIA, provides us with the critical questions to ask in order to ensure fair and unbiased data.
Stretch focuses on identifying customers challenges and designing innovative cybersecurity solutions to solve their complex problems. Stretchs distinguished career serving in the United States Air Force has supported engineering solutions in theater, supporting both Operation Inherent Resolve (OIR) and Enduring Freedom Afghanistan.
Christine applies her deep industry insight to ensure that Oktas industry-leading innovations meet security and compliance requirements while offering an optimal user experience for the companys more than 24 million federal, state, local, education and healthcare users.
This week on Feds At the Edge , federal leaders offer their suggestions on managing this ever-evolving and complex landscape, with a focus on training, understanding data and leveraging cloud functions. Before joining TSA, Ms. He brings a strong background in public and private IT management and leadership. He has 9 children and 13.5
This new technology will modernize legacy systems at the IRS, highlighting the opportunities for innovation that generative AI provides. Reza Rashidi × Reza Rashidi Director, Research Applied Analytics & Statistics Reza Rashidi is the Director, IRS, Research Applied Analytics & Statistics (RAAS) Data Management Division (DMD).
Among the innovative ways agencies are responding to the ever-evolving threat landscape are expanded collaboration between federal and state/local agencies, initiatives such as Zero Trust to raise the security bar, and FedRAMP/StateRAMP vehicles to provide a uniform security baseline. Murphy, Ph.D. × × John B. Murphy, Ph.D.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content