This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
NTT DATA has appointed Jack Nichols as operations director of defense networks and cyber integrations, bringing over three decades of leadership experience gained while serving with the U.S. The new […]
Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
Friday, October 13, 2023 | 2:00PM EDT | 1 Hour | 1 CPE In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. and its allies and partners.
Data and AI-driven tools can increase visibility into, and lessons learned from hiring, onboarding, and turnover, but understanding the significance of those findings and their impact on the workforce and overall mission success is key to realizing the full potential of HR modernization. Certificates will be e-mailed to registrants.
One of the country’s leading generative AI startups is urging congressional leadership to take action on a trio of safety, data and definitional priorities for the emerging technology before the end of the year. The second priority involves the creation of AI-ready data requirements for every federal agency.
Despite being rich in data, many agencies are lagging in the data modernization needed to support AI – and combining incomplete or inaccurate data with AI can lead to hallucinations , ultimately placing mission delivery at stake. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Tune in on your favorite Podcasting Platforms.
Wednesday, April 3, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. He has twice been awarded Jessie H.
Tuesday, October 31, 2023 | 2:00PM EDT | 1 Hour | Training Certificate We all now live in a data-driven world. And the federal government may be the single largest generator – and user – of data in the world. Without a comprehensive data strategy, the legal and ethical challenges limit the potential of this emerging technology.
Orbital data centers. Hell focus on actionable ways to apply emerging tech like GenAI, 5G/6G networks and space-cloud convergence while keeping mission, security and compliance front and center. These initial ideas will be refined through partnership with council leadership to best serve our members’ needs.
Alongside that comes understanding the location, nature, and sensitivity of the data within the agency. The two are complementary, since part of digital identity is restricting access to the data a user has the right to touch. Prior to BigID, she held leadership roles at Morgan Stanley, AIG and S&P Global. & CIO, Dept.
Tuesday, August 20, 2024 | 2:00PM EDT | 1 Hour | 1 CPE As agencies face unprecedented data volumes and velocity, managing the speed and size of the data flow efficiently becomes a significant challenge , especially with the growing use of AI-based analytics.
Tuesday, October 10, 2023 | 2:00PM EDT | 1 Hour | Training Certificate The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. As a Cyber Leader in the U.S
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
Thursday, January 18, 2024 | 2:00PM EST | 1 Hour | Training Certificate State and local governments and education produce large amounts of unstructured data in a wide range of data types. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educational and government operations.
Andrew Manos, Director, Commercial Services for True Zero Technologies, suggests that, given today’s data volume, centralizing data is essential. Nate Fontaine’s exceptional contributions to education, local and federal government, and community service embody the values of leadership, service, and honor.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Certificates will be e-mailed to registrants.
As we celebrate, we find ourselves at the crossroads of progress and potential, confronting the myths holding women back from participating in public procurement and attaining certain heights in leadership. We focused on the plan, the data, and the purpose of what we want to achieve. It’s not just an administrative process.
When the federal government adopts Zero Trust principles, it must consider both user identity and the data being accessed. To view this webinar: Zero Trust: Protecting Both Data and Identity. BigID enables organizations to know their enterprise data and take action for privacy, protection, and perspective.
The challenge of becoming a data-driven organization Organizations deal with ever-growing data volumes. This means that growth-minded businesses must put data at the heart of every application, process, and decision. percent of companies describe themselves as data-driven , and a mere 20.6
Having a completed checklist can give agencies a sense of security, but with today’s explosion of data and potential attack from an unexpected vector, have they been falsely “lulled into complacency?” And avoiding data hoarding to prevent hidden attack codes. To view this webinar: The Hard Truths of Data Security in the Public Sector.
As Forbes describes it, “Traditional AI systems are primarily used to analyze data and make predictions, while generative AI goes a step further by creating new data similar to its training data.” What’s the difference? Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.
NSF on Thursday announced it had started construction on the Leadership-Class Computing Facility, which will be led by the University of Texas at Austin. A spokesperson said leadership-class computing is one of three complementary advanced computing areas in which NSF invests.
Years ago, Federal leaders would dream of getting terabytes of data; few thought we would have more computing power than trusted information. This week on Feds At the Edge, our discussion focuses on some of the risks in storing, sharing, and analyzing that data. What impact does generated data have? Share everything?
serves as Director, G36 Cyber Defense and Network Operations, U.S. in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. Close Director, Cyber Defense & Network Operations, U.S. Army Cyber Command (ARCYBER). Eovito × Col Bryan A.
CISAs new CDM Data Model Document(DMD) sets out the minimum set of data requirements needed to leverage the CDM solution to reduce every agencys threat surface, increase visibility into the federal cybersecurity posture, improve cybersecurity response capabilities, and streamline FISMA reporting. He has twice been awarded Jessie H.
With data generation being on the ever-constant increase, new solutions to protect it are needed to keep up with the challenge. In this week’s episode of Fed At the Edge, we sit down with a veteran in data protection, Aaron Lewis – Head of Public Sector Sales, Engineering for Rubrik. Not all data is the same. Has it been tested?
He has been in numerous leadership roles in the private sector for over 25 years, spanning accounting, finance, technology & operations management spheres. Leadership is enabling the right culture for people to pursue their passions. Certificates will be e-mailed to registrants. He is a Certified Public Accountant.
AWS Partner ScaleCapacity automated the Nebraska Judicial Branch’s document management system and introduced a generative AI feature, with the goal to enable attorneys to swiftly access data and information from any case exhibit. Join the AWS Partner Network or find and work with one of our partners today.
Specializing in both application and infrastructure security, Stephen’s proficiency extends across on-premise data centers and cloud architectures. Throughout his career, Stephen has demonstrated his capabilities in various roles, from technical operations to leadership and management. among others.
This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly.
Mountains of data and Artificial intelligence are impacting every aspect of all federal agencies. This is the perfect example of how using data & AI will help all federal agencies in the three methods we explore: We’ll explore identity management on the large scale, advances made, and the challenge of digital credentials.
Attackers can gain unauthorized access to a company’s data if Active Directory is compromised; monitoring your AD will help protect system integrity, availability, and overall cybersecurity. He is a recipient of the prestigious Fed 100 Award, recognizing his leadership at that agency. Certificates will be e-mailed to registrants.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
Wednesday, June 26, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. He has twice been awarded Jessie H.
Thursday, August 22, 2023 | 12:00PM – 5:00PM EDT | 3 CPE | Reston, VA 5G networks have become more common over the past few years. devices use 5G, 51% of data traffic is 5G. At the 5G Americas conference in October 2023, the keynote speaker said the U.S./Canada Additionally, while 33% of US.
enterprise, non-terrestrial network and public sector customers. Greig joined the Druid team in 2022 after spending 28 years in the telecom space with leadership roles in IoT, connected vehicle, VoIP, MVNOs, and managed services; across organizations that include Aeris Communications, Arterra Mobility and Sprint.
When they buy technology, cities and counties will often face multiple issues, says Dean Cunningham , segment development manager, Public Safety at Axis Communications , a company that produces network cameras, access control systems, network audio devices and other IP networking solutions for physical security and video surveillance applications.
Tuesday, March 26, 2024 | 11:00AM EDT | 1 Hour | 1 CPE As agencies increasingly migrate their workloads to the cloud, it is crucial to understand the implications and benefits of writing natively to the cloud, which enables organizations to optimize their data protection strategies, streamline operations, and enhance overall security.
For instance, 5G networks must have state-of-the-art security and encryption, since they will be targets of cyber attacks, espionage and data breaches. He has more than 22 years of experience in the telecommunications industry and has held technical leadership positions at top technology companies, startups, and research labs.
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization. Food and Drug Administration. government policies, programs, and initiatives.
This week we’re diving right in with data, more specifically the expanded cyber landscape full of personal data malicious actors gained easier access to as the workforce transitioned into remote working. We will also address the double-edge sword of automation. He has held security, telecommunications and I.T.
Akiba has 25+ years of experience leading software and services businesses for government and commercial clients in the domains of cybersecurity, data and analytics and collaboration. Wayne earned a Bachelor of Science degree in Computer Networks & Cybersecurity from University of Maryland Global Campus (UMGC).
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content