This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
Wednesday, April 3, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems.
Tuesday, August 20, 2024 | 2:00PM EDT | 1 Hour | 1 CPE As agencies face unprecedented data volumes and velocity, managing the speed and size of the data flow efficiently becomes a significant challenge , especially with the growing use of AI-based analytics.
Thursday, January 18, 2024 | 2:00PM EST | 1 Hour | Training Certificate State and local governments and education produce large amounts of unstructured data in a wide range of data types. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educational and government operations.
Tuesday, October 10, 2023 | 2:00PM EDT | 1 Hour | Training Certificate The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. As a Cyber Leader in the U.S
As Forbes describes it, “Traditional AI systems are primarily used to analyze data and make predictions, while generative AI goes a step further by creating new data similar to its training data.” What’s the difference? Certificates will be e-mailed to registrants.
Having a completed checklist can give agencies a sense of security, but with today’s explosion of data and potential attack from an unexpected vector, have they been falsely “lulled into complacency?” And avoiding data hoarding to prevent hidden attack codes. To view this webinar: The Hard Truths of Data Security in the Public Sector.
With data generation being on the ever-constant increase, new solutions to protect it are needed to keep up with the challenge. In this week’s episode of Fed At the Edge, we sit down with a veteran in data protection, Aaron Lewis – Head of Public Sector Sales, Engineering for Rubrik. Not all data is the same. Has it been tested?
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Certificates will be e-mailed to registrants.
Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter – suddenly the systems had to become decentralized, distributed and open to remote workers.
CISAs new CDM Data Model Document(DMD) sets out the minimum set of data requirements needed to leverage the CDM solution to reduce every agencys threat surface, increase visibility into the federal cybersecurity posture, improve cybersecurity response capabilities, and streamline FISMA reporting.
He has over 20 years of technology consulting experience in the areas of data visualization, geospatial analytics, data management, and data science. In his role, Kyle builds teams that use data to create innovative solutions to difficult business challenges.
His firm is a data-centric cloud security company. The following link includes Lookout case studies and whitepapers and other resources. As more state and local agencies adopt cloud technology and migrate valuable data, criminals’ methods for carrying out ransomware attacks have become more sophisticated.”
Harnessing AI is a useful way to advance modernization goals, but AI governance—including ethical considerations, data security, and compliance with federal regulations—must remain a top priority. And increased AI implementation demand that organizations rethink how they staff, develop, and run their day-to-day operations. .”
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
Wednesday, June 26, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.
Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes.
It’s likely to be the largest breach the sector has ever faced, disrupting billions in payments to doctors and hospitals, and potentially exposing the personal data of one-in-three Americans,” Modern Healthcare reported. This “cyberattack … paralyzed much of the US healthcare system.
It’s likely to be the largest breach the sector has ever faced, disrupting billions in payments to doctors and hospitals, and potentially exposing the personal data of one-in-three Americans,” Modern Healthcare reported. This “cyberattack … paralyzed much of the US healthcare system.
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.
He has led numerous reviews of federal data center optimization and cloud computing, and was responsible for GAO’s work on the High-Risk area of Improving the Management of IT Acquisitions and Operations. Where he managed BD functions for the AWS Snow edge compute and Hybrid/Edge computing and data movement services portfolios.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan is VP, Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan Casey is Vice President of Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics.
More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors- who with a little compromised code began opening extremely hard to find doors to sensitive data. For six years at FMC, Inc.,
Mangala also serves as the Director of Technology, Innovation and Engineering, responsible for overseeing the development and operations of the department’s Enterprise Data Platform and Artificial Intelligence and Machine Language strategies and policies.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
What once was a quick way to integrate systems but minimally used, now has exploded onto federal networks by the thousands thanks to the popularity of cloud use. How do we protect federal data? He developed analytical tools, data requirements, and system access needs in support of these missions.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. He joined INL four years go.
To do so successfully, leaders in critical sectors like healthcare, finance, and federal government must develop ethical policies for using data securely in AI. For instance, AI-powered tools can improve operations by streamlining processes, a tactical benefit.
To do so successfully, leaders in critical sectors like healthcare, finance, and federal government must develop ethical policies for using data securely in AI. For instance, AI-powered tools can improve operations by streamlining processes, a tactical benefit.
Patrick Thompson, Director of Infrastructure for the US Coast Guard showcases their leap forward with high-speed satellite services, turning ships into what he calls floating data centers. Previously he led a $200M effort to upgrade all desktop compute and network infrastructure capabilities across the Coast Guard 60,000 user base.
He began his career as a network engineer and a systems administrator. Recently, he has been focused on empowering organizations to enhance their security posture by leveraging clean, rationalized, normalized, and enriched IT Asset Management (ITAM) data.
CPE In 2023, 725 data breaches were reported to the Department of Health and Human Services, according to HIPAA Journal. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
And what of the data that is the “fuel” powering AI? How is that data validated and being used to avoid bias? This paper includes forecasts for the PPE needs of all three agencies and, borne of the nation’s experiences with COVID-19, is part of a larger effort to reduce Government reliance on essential foreign goods, including PPE.
Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge , we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “ zero trust model.” Limiting our understanding to “the main and the plain” could lead to trouble.
Therefore, by using the supplier’s desire for payment, and good quality data, top performing organizations can achieve high levels of straight-through-processing and automation. . This is because at each step; data is gathered, suppliers are onboarded, and deliveries are accepted. What Are The Benefits of Invoice-to-Pay?
Tuesday, March 26, 2024 | 11:00AM EDT | 1 Hour | 1 CPE As agencies increasingly migrate their workloads to the cloud, it is crucial to understand the implications and benefits of writing natively to the cloud, which enables organizations to optimize their data protection strategies, streamline operations, and enhance overall security.
Close Zero Trust Technologist, Optiv + Clearshark Wayne LeRiche × Wayne LeRiche Federal Civilian Field CTO Wayne LeRiche is the Federal Civilian Field CTO at Palo Alto Networks. Federal Civilian teams at Palo Alto Networks through the creation and delivery of business-relevant security conversations to our key customers.
Even those with well-resourced data systems might find it challenging to imagine the practical potential of AI. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
CPE Federal CIOs know the days of protecting a network perimeter are gone — firewalls were never designed to address edge computing, remote work, hybrid clouds, or multiple devices used by a single person. Wednesday, July 24, 2024 | 2:00PM EDT | 90 Minutes | 1.5 Franks is a Director in GAO’s Information Technology and Cybersecurity team.
What agencies are looking for is help addressing their boots-on-the-ground challenges, such as the lack of specialized talent, where they should invest their limited R&D funds, meeting the lofty standards of the AI bill of rights – or even how their own data assets are gathered, organized, and used in AI applications.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content