This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. Army War College.
“Local governments face issues that range from balancing public safety and individual privacy rights to managing vast amounts of data securely and efficiently. Transparency and accountability are crucial to maintaining public trust and require clear policies on surveillance use and data access.”
Our popular Fun with the FAR Training course offers an engaging way to master the Federal Acquisition Regulation (FAR) and its implications for subcontractor management. By understanding these regulations, you can better protect your organization from compliance-related risks.
Efficient communication, the ability to securely share information and projectmanage efforts are all key to scaling collaboration across more processes, suppliers & categories. Success requires the following: Gain control of enterprise supplier data. Manage categories like a financial portfolio.
Tuesday, September 24, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In the rapidly advancing world of artificial intelligence (AI), government agencies are leveraging AI technologies to enhance security, operational efficiency, and data analysis across various sectors. Before joining GSA, Zach served as the Chief Data Officer at the U.S.
Below, we outline the 5 steps toward modernizing supplier management, addressing both transparency and effective engagement. Gain control of your supplier data. Data remains dispersed among multiple systems, with duplicates and errors common. Leaders must plan out the long-term data approach when selecting technology.
In this week’s episode of Feds at the Edge, we will dive into the unique challenges the federal government faces in identity management. From heavy security requirements and vast amounts of data to limited budgets, we’re unpacking the challenges and exploring innovative solutions to solve the vexing crisis agencies face today.
Williams, and Mickey Liebner; Mayer Brown Bipartisan, bicameral legislation in the US Congress would mandate the use of the National Institute of Standards and Technology’s (“NIST”) Artificial Intelligence RiskManagement Framework (“Framework”) by federal agencies. The guidance does not apply to the Federal Supply Schedule.
Williams, and Mickey Liebner; Mayer Brown Bipartisan, bicameral legislation in the US Congress would mandate the use of the National Institute of Standards and Technology’s (“NIST”) Artificial Intelligence RiskManagement Framework (“Framework”) by federal agencies. The guidance does not apply to the Federal Supply Schedule.
Additionally, Mark helps clients understand where to start with zero trust and how to utilize security program management and security riskmanagement to ensure continued success in the implementation of Zero Trust concepts. He holds CISSP, CGEIT, ITIL, ZTCA and MCSE certifications.
Developing a good data inventory: Full of IoT devices? Learn what to include for your expanded attack surface Human Interaction: Learn the critical role humans play amid the new promises of AI Contingency Plans: If your agency was attacked today with ransomware, would you be able to identify your critical data?
In this capacity Kimberly served as the Chair for the Agency’s Procurement Equity Workgroup, the Agency’s Senior Accountable Official for Supply Chain RiskManagement, and the Senior Accountable Official for EPA’s Made-in-America implementation. Keith holds a Bachelor’s in Biology, from Purdue University, and an MBA from Virginia Tech.
Close Publisher, FedInsider Joe Dabrowski × Joe Dabrowski Regional Vice President, SLED Joe leads America’s State, Local and Education Sales organization at Rubrik, working with SLED customers around the country on leveraging the Rubrik Data Security platform to drive cyber resiliency. Murphy, Ph.D. × × John B.
Wednesday, November 1, 2023 | 1:00PM EDT | 2 Hours | Training Certificate Ever since the dawn of the internet, its value lies in the data it handles, whether moving it, storing it, or calculating with it. and state agencies’ data because they need the money. Data Rich But Cyber Poor Curt W. As a Cyber Leader in the U.S
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content