This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
New Risk Center adds capabilities and integrations to extend existing leadership in enabling holistic management of supplier risk. Ivalua’s Risk Center offers customers a holistic solution to actively monitor and mitigate third-party risk and compliance.
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization. National Institute of Standards and Technology, Information Technology Laboratory.
Andrew Manos, Director, Commercial Services for True Zero Technologies, suggests that, given today’s data volume, centralizing data is essential. As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, riskmanagement, agency incident response plans, and programs.
“Local governments face issues that range from balancing public safety and individual privacy rights to managing vast amounts of data securely and efficiently. Transparency and accountability are crucial to maintaining public trust and require clear policies on surveillance use and data access.”
She oversees work on emerging cybersecurity issues and federal agencies’ abilities to protect privacy, sensitive data, and the computing infrastructure. Prior to joining ICE, Rob worked in leadership positions at several companies including Knowledge Consulting Group, Hewlett Packard (HP), and Electronic Data Systems (EDS).
North Carolina State Poole College of Management recently produced this 28 page report entitled “ 2019 Supply Chain Data Quality and Governance Study ”. The report contains some great illustrations of the current state of Data governance across the organizations that were surveyed, with a specific focus on the supply chain.
in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. He has also served as a Knowledge Manager at U.S. He has nearly 20 years of experience in the cybersecurity domain, with focuses on RiskManagement Framework and Software Assurance.
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. The Memo is organized around three strategic goals: managing AI risk and performance, promoting a competitive AI market with innovative acquisition, and ensuring collaboration across the federal government.
This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.
At the federal level, the Office of Management and Budget (OMB) issued a memo in March providing guidance for agencies to establish AI governance and riskmanagement techniques while implementing innovative uses for their own organizations, including steps to enable sharing and reuse of AI models, code, and data.
The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. Army War College.
Jarrod McAdoo, Senior Product Marketing Manager, Ivalua. Master supplier data doesn’t just matter to Procurement. Accurate supplier data is the fuel that drives critical business processes that impact the bottom line. Supplier data improvements can reduce these costs and minimize the opportunity for error. Operations.
He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. He has spent more than 15 years in supervisory leadership roles across various cybersecurity functions. He has twice been awarded Jessie H. Department of Labor.
Compliance is difficult enough in an air-conditioned data center, so for those out on the edge with spotty communication and potential bullets flying around, it could be near impossible. This week on Feds At the Edge, we offer some perspectives on how to manage this arduous task. Central Command, U.S. Close CISO, U.S.
Compliance is difficult enough in an air-conditioned data center, so for those out on the edge with spotty communication and potential bullets flying around, it could be near impossible. This week on Feds At the Edge, we offer some perspectives on how to manage this arduous task. Central Command, U.S. Close CISO, U.S.
Jones brings valuable leadership, technical expertise, knowledge, and global experience to the position. In those roles, she optimized NSA’s IT strategy for the CIO Inspector General and Policy, IT Accessibility, Chief Information Security Officer, and Chief Data Officer portfolios. Most recently, Ms. Throughout her career, Ms.
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. It includes a Zero Trust security roadmap that outlines suggested actions that agencies can take to protect, identify, define, and categorize data. James Peake , M.D.,
They’ll cover topics such as employee and constituent engagement, artificial intelligence, data use and literacy, cybersecurity, diversity and inclusion, and more. Max Aulakh leads Ignyte Assurance Platform as the Managing Director focused on helping organizations cut through cyber security challenges. Max is a former U.S
In this week’s episode of Feds at the Edge, we will dive into the unique challenges the federal government faces in identity management. From heavy security requirements and vast amounts of data to limited budgets, we’re unpacking the challenges and exploring innovative solutions to solve the vexing crisis agencies face today.
The world of manufacturing is quickly evolving, driven by production modernization, materials innovation, big data, and a new type of workforce. Improving sourcing cycle time is critical, as is having the right information in place to navigate around roadblocks and mitigate risk. It’s time to add some data experts to your teams.
Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. Under Roser’s leadership the experiment published ~450 refereed scientific papers.
He had taken on a few leadership roles in Flex such as Procurement Compliance Director, led the Global Sourcing team, and is currently member of Flex Supply Chain Council and Supply Chain RiskManagement. Daniel Koh is currently leading a team of 130 sourcing and pricing professionals globally.
An overwhelming 84% of respondents indicated that their agency leadership considers understanding the impact of generative AI as a critical or important priority level for agency operations. Significantly, 71% believe that the potential advantages of employing generative AI in their agency’s operations outweigh the perceived risks.
In addition, he will provide updates on the RiskManagement Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare. These efforts play a pivotal role in ensuring that veterans receive the quality care and support they deserve.
According to the EBA guidelines, outsourcing an activity shall never: Transfer bank’s senior management responsibility of running core management functions (e.g, risk strategy & oversight of business operations). Impair riskmanagement obligations. Outsourcing lifecycle management. fourth-party risk).
Tuesday, September 24, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In the rapidly advancing world of artificial intelligence (AI), government agencies are leveraging AI technologies to enhance security, operational efficiency, and data analysis across various sectors. Before joining GSA, Zach served as the Chief Data Officer at the U.S.
The latest bid, which followed at least two previous failures, is facing similar troubles as earlier projects: incomplete planning, a technology platform with questionable maturity and, maybe most striking, the hubris of the leadership that their current plan will be successful no matter what evidence emerges that tells a different story.
She oversees work on federal cybersecurity and privacy issues, including specific agencies’ ability to protect privacy, sensitive data, and the computing infrastructure. Close Chief Information Security Officer, Department of Labor JD Jack × JD Jack General Manager J.D.
Originally published on RiskManagement Monitor. A better way of looking at those relationships is as partnerships—albeit ones that require management and alignment of objectives first and foremost, but ultimately mutually beneficial relationships. Secure executive buy-in from procurement, supply chain and IT leadership.
Ivalua has seen accelerating growth and recognition of its leadership in recent years. Built on a single code base with a unified data model, customers benefit from superior transparency and a consistent, seamless user experience. . “ In such a transformation, selecting the right software is an obvious success factor.
Take Control of Your Supplier Data Dealing with so many objectives and changing conditions requires more information than ever before, particularly regarding suppliers. It is also a major risk. Without sufficient data, you end up making unknown and sometimes unnecessary compromises, exposing organizations to other risks.
Today, they are tackling new priorities like riskmanagement, supplier compliance, actionable insights. The modern CPO can use Smart Procurement technology to address the poor quality of data and lack of integration. Traditionally, the CPO’s first priority was to ensure the optimization and reduction of costs.
While each municipality may be in a different position regarding each of the 5 areas described below, they all remain prime for improvement, whether from a beginning position to a more mature one or from a mature position to a leadership level. . The first step is to know which suppliers the city or county does business with.
Third, the alignment provides an opportunity to improve datamanagement. FAS and the federal government as a whole are in the midst of a management transition towards data-driven decision making. Data context is critical to data driven decision making. How old is the data? Is the data accurate?
The most fundamental spend categorization in Procurement is the line between direct and indirect spend, but one effort that transcends this split is supplier management. This includes supplier information management, supply chain riskmanagement/mitigation, and supplier performance management.
During the training, Jason, Liam, and Alex will cover the following topics and more: Pricing – Transactional Data Reporting (TDR)/Commercial Sales Practices (CSP); Domestic Preferences; Supply Chain; Enforcement/Mandatory Disclosure/Ethics; Sustainability Requirements/Policy; and Bid Protests Update. James Peake , M.D.,
Nowadays, Procurement practitioners primarily talk about emerging topics like the reduction of scope 3 emissions, supplier-enabled innovation and supply riskmanagement. Your leadership team plays a central role in steering this principle, from the start when launching the procurement policy and during operations. .
Currently, there are “more than 100 categories of CUI, ranging from technical weapon system data to historic properties and death records.” AI leadership, including the creation of a task force focused on datacenter infrastructure. The plan notes that the effectiveness of cyber riskmanagement varies among agencies.
He also outlined the road map for the next two years, and it’s clear Ivalua is seeking to be right up there at the leading edge of capability across the whole platform, from riskmanagement to advanced sourcing options. The Future of Procurement” is not a wholly original title, but the next session from Natacha Tréhan was excellent.
Additionally, he has been a part of the IT Leadership Committee (ITLC), served as a Cybersecurity Chair, and been a member of the Digital Government Advisor Board. He has over 25 years of industry experience in IT networking, cyber security, and data center design and implementation. Public Sector West for Fortinet.
Close Publisher, FedInsider Joe Dabrowski × Joe Dabrowski Regional Vice President, SLED Joe leads America’s State, Local and Education Sales organization at Rubrik, working with SLED customers around the country on leveraging the Rubrik Data Security platform to drive cyber resiliency. He has twice been awarded Jessie H.
“With these resources and the previous work on AI from the Department, we are continuing to support responsible innovation in AI and America’s technological leadership.” Among the four documents released by NIST on Monday was a draft version of a publication aimed at helping identify generative AI risks and strategy for using the technology.
Hemant Baidwan, CISO for DHS, OCIO, noted that Continuous Diagnostics and Mitigation is a comprehensive suite of tools and policies, with a key focus on understanding the attack surface and ensuring high data quality during deployment. Prior to his current position, Mr. Baidwan served as the Deputy Chief Information Security Officer for DHS.
What agencies are looking for is help addressing their boots-on-the-ground challenges, such as the lack of specialized talent, where they should invest their limited R&D funds, meeting the lofty standards of the AI bill of rights – or even how their own data assets are gathered, organized, and used in AI applications.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content