This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.
The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. Army War College.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
Acquisition is the primary way where the government gets access to the products and services that it needs to deliver on the mission, and it’s data driven process. 100% of acquisition, the heart of the smart modern acquisition is data. And we’ve done significant work over the last few years to get our data position strong.
Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. He joined INL four years go.
What agencies are looking for is help addressing their boots-on-the-ground challenges, such as the lack of specialized talent, where they should invest their limited R&D funds, meeting the lofty standards of the AI bill of rights – or even how their own data assets are gathered, organized, and used in AI applications.
Additionally, Mark helps clients understand where to start with zero trust and how to utilize security program management and security riskmanagement to ensure continued success in the implementation of Zero Trust concepts.
They’ll cover topics such as employee and constituent engagement, artificial intelligence, data use and literacy, cybersecurity, diversity and inclusion, and more. Max Aulakh leads Ignyte Assurance Platform as the Managing Director focused on helping organizations cut through cyber security challenges. Max is a former U.S
Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface Human Interaction: Learn the critical role humans play amid the new promises of AI Contingency Plans: If your agency was attacked today with ransomware, would you be able to identify your critical data?
Close Publisher, FedInsider Joe Dabrowski × Joe Dabrowski Regional Vice President, SLED Joe leads America’s State, Local and Education Sales organization at Rubrik, working with SLED customers around the country on leveraging the Rubrik Data Security platform to drive cyber resiliency. Murphy, Ph.D. × × John B.
Wednesday, November 1, 2023 | 1:00PM EDT | 2 Hours | Training Certificate Ever since the dawn of the internet, its value lies in the data it handles, whether moving it, storing it, or calculating with it. and state agencies’ data because they need the money. Even hostile nation-states such as North Korea seek U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content