This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. Garris is accomplished technologist with over 26 years of federal cybersecurity leadership expertise including 15 years leading cyber programs for the Federal Bureau of Investigation. He has twice been awarded Jessie H.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Costello is a nine-year veteran of the U.S
Singh is passionate about process and projectmanagement. He has been in numerous leadership roles in the private sector for over 25 years, spanning accounting, finance, technology & operations management spheres. The critical thread across roles is Program, Process and ProjectManagement.
Ivalua Spend Management Insights [ivory-search] Get Ready for Success! Up front efforts to define roles and responsibilities, document requirements, integrate with other enterprise systems, and maximize the value of data will be rewarded in multiple forms well beyond the conclusion of the implementation.
Department of Energy’s Offices of the CFO A leadership expert once said , “Change is hard at first, messy in the middle and gorgeous at the end.” 6 Steps to Success But great rewards are possible with effective change management. An interview with LeAnn Oliver, Director of Corporate Business Systems, U.S.
The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement.
“Local governments face issues that range from balancing public safety and individual privacy rights to managing vast amounts of data securely and efficiently. Transparency and accountability are crucial to maintaining public trust and require clear policies on surveillance use and data access.”
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. Prior to joining HHS, La Monte worked in various cybersecurity leadership roles including CISO of Headquarters, U.S. He has twice been awarded Jessie H.
Meanwhile, New York City’s Office of Technology and Innovation has its own IT strategic plan , focusing on such goals as universal broadband access, simplifying online service delivery, and harnessing data to advance data-driven operations. Additional Information: Prerequisites & Advance Preparation : None required.
AWS Marketplace is an online store for businesses and public sector organizations to find, test, buy, and deploy software and data products that run on AWS. The courses span critical professional skills such as projectmanagement, development, leadership, and more. What is AWS Marketplace?
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
According to Summer Xiao , Deputy CIO in Houston’s ProjectManagement Office, “The public actually doesn’t want to engage with you.” The system looks at CX drivers such as employee helpfulness, ease and simplicity, and equity; it can analyze response data based on geographical location, type of service, demographics and other concerns.
The first aid I learned as a teenager have also helped me with projectmanagement. On several occasions I had to practice first aid on my projects. Or teach my team to handle a project emergency while I was away. The same goes for the injured project. What’s In Your Project First Aid Kit?
They have impressive government and industry experience and will cover topics such as IT; diversity, equity and inclusion; workforce management; process improvement; leadership; career building; and customer experience, to name just a few. Moffat is a mom, civil servant, community volunteer, and leadership coach.
Featured Speakers: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
In this week’s episode of Feds at the Edge, we will dive into the unique challenges the federal government faces in identity management. From heavy security requirements and vast amounts of data to limited budgets, we’re unpacking the challenges and exploring innovative solutions to solve the vexing crisis agencies face today.
Whether you're a CEO, a projectmanager, or a team leader, you're well aware of the importance of effective collaboration within your organization. So, let's dive into the realm of cross-functional collaboration and discover valuable insights and tips that can help you excel in your leadership role. Let's get started!
Modernization : Whether large or small, all states are dealing with the mounting technical debt that comes from managing decades old systems that don’t enable strategic initiatives or the sharing of data, provide a poor user experience, and are prone to security vulnerabilities. Even lower level positions can be challenging to fill.
Government Speakers: Evan Albert, Director of Measurement and Data Analytics, U.S. Government Speakers: Skip Jentsch, Cloud ProjectsManager, General Services Administration Thomas Santucci, Director, Government-Wirde Policy (DCOI and CloudSmart), General Services Administration Monday, May 22 | 4-4:30 ET/1-1:30 p.m.
CPE In 2023, 725 data breaches were reported to the Department of Health and Human Services, according to HIPAA Journal. CPE credit in Business Management & Organization.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. Wednesday, August 28, 2024 | 2:00PM EDT | 90 Minutes | 1.5
I had completed several leadership programs and been promoted to high-visibility positions. I worked on high-impact company projects, and I worked with my management team to document a career path that took me all the way to corporate headquarters. But you can feel overwhelmed while wondering how to do it.
Up until a couple of years ago, we didn’t even have any data scientists at CMS,” Fletcher said. We had more people wanting a job as a data scientist at CMS than we had open spots, which is amazing for us.” We have a really robust data science community,” she explained. Her efforts are paying off. “Up
As the largest city in the United States, New York City has its own technology roadmap , focusing on universal broadband access, improving online service delivery, and using data to advance data-driven operations. And both the state and the city have open data portals to provide accessibility, transparency, and accountability.
Tuesday, September 24, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In the rapidly advancing world of artificial intelligence (AI), government agencies are leveraging AI technologies to enhance security, operational efficiency, and data analysis across various sectors. Before joining GSA, Zach served as the Chief Data Officer at the U.S.
Within this period, La Monte also served as the Acting CIO and eventually the Director for the Operations and Management Division, where his focus was to bring secure & high-performance computing platforms to every user in OIG. Department of Homeland Security (DHS) and the Federal Emergency Management Agency (FEMA).
The government took three key steps: i) careful planning for the green transition; ii) implementing green public procurement (GPP) in practice with a focus on building the capacity of public buyers; and iii) learning powered by data-driven monitoring with a public dashboard. Can everything be green?
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and ProjectManagement Professional (PMP) certifications. He has twice been awarded Jessie H.
New Executive Leadership for Enterprise Technology Solutions On February 16, 2023, Jake Marcellus became the Executive Director for Enterprise Technology Solutions (ETS). His team developed a system to use disconnect data to identify the most significant transition risks and make the appropriate executive engagements with agencies.
Here it is essential to deploy technology that can digitize the complete procurement / AP process , to ensure quality data and access across all processes, and seamless process flows. This is a key reason vendors have rushed to offer full suites and plug any gaps they had. Most strategic initiatives span more than one solution area.
Ivalua was also awarded the the best P2P Specialist Provider by an independent panel of industry veterans at the 2020 World Procurement Awards and This release will support extending its leadership by delivering ever greater value to customers. Specific release highlights include: Supplier Management Innovations: .
Our users and indeed our own teams also want speed in terms of rapid access to data and information. We shouldn’t have to wait months to get the latest business unit spend data or have to work for days when the CFO asks us to produce a report on supplier performance in one of our key categories.
Agencies and members of industry share the benefits and best practices of adopting a data-driven cybersecurity program. Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. This is particularly helpful in meeting Federal Information Security Management Act mandates. “The
Modisette has a bachelor’s degree in computer science and a master’s degree in information systems security management and a graduate certificate in projectmanagement. He holds CISSP, CGEIT, ITIL, ZTCA and MCSE certifications. He has twice been awarded Jessie H.
She is a catalyst for change, inspiring transformational leadership as a holistic wellness specialist and certified life coach, international best-selling author &motivational speaker, Dance director, and a mom of three. She is passionate about empowering women to take charge of their lives and break through the glass ceiling.
Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface Human Interaction: Learn the critical role humans play amid the new promises of AI Contingency Plans: If your agency was attacked today with ransomware, would you be able to identify your critical data?
Under her leadership the Agency’s final DBE Rule was promulgated and implemented. In 2021, Kimberly was the recipient of the Presidential Rank Award for Meritorious Service, recognizing her career of leadership and service to EPA. As a member of the Senior Executive Service, Ms. Prior to this appointment, Ms.
Managing vast amounts of data, reducing alert fatigue, and improving threat detection can all be accomplished with automation. During his tenure in ENTSD, he oversaw the modernization of the largest data network in DHS, improved connectivity to cloud service providers, and dramatically increased the agencys usage of mobility platforms.
She is a catalyst for change, inspiring transformational leadership as a holistic wellness specialist and certified life coach, international best-selling author and motivational speaker, dance director, and a mom of three. She is passionate about empowering women to take charge of their lives and break through the glass ceiling.
In private industry, Mr. DiPietro served as a network engineer, datacenter manager, and projectmanager for a global public company where he was responsible for supporting 23 global offices and four regional datacenters ensuring corporations network security and product availability. Dave joined GAO in July 2002.
Close Publisher, FedInsider Joe Dabrowski × Joe Dabrowski Regional Vice President, SLED Joe leads America’s State, Local and Education Sales organization at Rubrik, working with SLED customers around the country on leveraging the Rubrik Data Security platform to drive cyber resiliency. He has twice been awarded Jessie H.
Wednesday, November 1, 2023 | 1:00PM EDT | 2 Hours | Training Certificate Ever since the dawn of the internet, its value lies in the data it handles, whether moving it, storing it, or calculating with it. and state agencies’ data because they need the money. Even hostile nation-states such as North Korea seek U.S.
The group is what remains of a once-large team as the Trump administration massively scales down American foreign aid and questions emerge about the future of USAID assets and the security of government data. Meanwhile, USAID employees abroad still have access to their devices, some of which carry valuable government data.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content