Remove Data Remove Leadership Remove Project Management
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. Garris is accomplished technologist with over 26 years of federal cybersecurity leadership expertise including 15 years leading cyber programs for the Federal Bureau of Investigation. He has twice been awarded Jessie H.

article thumbnail

Cyber Attacks are Just as Damaging as Natural Disasters

FedInsider

Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Costello is a nine-year veteran of the U.S

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Applying AI to Advance Agency Missions

FedInsider

Singh is passionate about process and project management. He has been in numerous leadership roles in the private sector for over 25 years, spanning accounting, finance, technology & operations management spheres. The critical thread across roles is Program, Process and Project Management.

article thumbnail

Get Ready for Success! 4 Critical Workstreams for Successful Procurement Implementation

ivalua

Ivalua Spend Management Insights [ivory-search] Get Ready for Success! Up front efforts to define roles and responsibilities, document requirements, integrate with other enterprise systems, and maximize the value of data will be rewarded in multiple forms well beyond the conclusion of the implementation.

article thumbnail

Knowing When, Where and How to Modernize

GovLoop

Department of Energy’s Offices of the CFO A leadership expert once said , “Change is hard at first, messy in the middle and gorgeous at the end.” 6 Steps to Success But great rewards are possible with effective change management. An interview with LeAnn Oliver, Director of Corporate Business Systems, U.S.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement.

article thumbnail

Governments need to plan for the entire product lifecycle when they purchase technology today

American City & Country

“Local governments face issues that range from balancing public safety and individual privacy rights to managing vast amounts of data securely and efficiently. Transparency and accountability are crucial to maintaining public trust and require clear policies on surveillance use and data access.”