Remove Distribution Remove Leadership Remove Risk Management
article thumbnail

DoD Embracing Continuous Monitoring (E172)

FedInsider

in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. He has also served as a Knowledge Manager at U.S. Ben is a lifelong technologist with a special passion for secure software supply chain, distributed systems, and memory-safe programming languages.

article thumbnail

Challenges of Continuous Compliance with a Remote Workforce (E147)

FedInsider

He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity Risk Management Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to Risk Management. Central Command, U.S. Close CISO, U.S.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Challenges of Continuous Compliance with a Remote Workforce

FedInsider

He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity Risk Management Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to Risk Management. Central Command, U.S. Close CISO, U.S.

article thumbnail

Identity Governance & Zero Trust: Best Practices for a Multi-Cloud Environment

FedInsider

Tuesday, October 29, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Managing identities and access across Microsoft Entra ID, Google Cloud, and AWS is a growing challenge for government agencies at all levels.

article thumbnail

Friday Flash 11/01/2024

The Coalition for Government Procurement

Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. Prioritize as a key contract consideration the handling of data, including procedures for data management, accountability, and access. James Peake , M.D.,

article thumbnail

Who are you – and can you prove it? Identity and Access Management

FedInsider

Over this 14 year tenure, he had numerous roles in the public sector, including engineering management and as an individual contributor in systems engineering and web applications. Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust (E140)

FedInsider

Prior to joining August Schell, John served as DISA’s Cyber Security Risk Management Executive and Chief Information Officer. Over this 14 year tenure, he had numerous roles in the public sector, including engineering management and as an individual contributor in systems engineering and web applications. Army War College.