This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. He has also served as a Knowledge Manager at U.S. Ben is a lifelong technologist with a special passion for secure software supply chain, distributed systems, and memory-safe programming languages.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Central Command, U.S. Close CISO, U.S.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Central Command, U.S. Close CISO, U.S.
Tuesday, October 29, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Managing identities and access across Microsoft Entra ID, Google Cloud, and AWS is a growing challenge for government agencies at all levels.
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. Prioritize as a key contract consideration the handling of data, including procedures for data management, accountability, and access. James Peake , M.D.,
Over this 14 year tenure, he had numerous roles in the public sector, including engineering management and as an individual contributor in systems engineering and web applications. Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution.
Prior to joining August Schell, John served as DISA’s Cyber Security RiskManagement Executive and Chief Information Officer. Over this 14 year tenure, he had numerous roles in the public sector, including engineering management and as an individual contributor in systems engineering and web applications. Army War College.
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. Prioritize as a key contract consideration the handling of data, including procedures for data management, accountability, and access. James Peake , M.D.,
Years ago, anti-virus software updates were distributed via floppy disks through the U.S. As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, riskmanagement, agency incident response plans, and programs. Immigration and Customs Enforcement.
Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. Joe is an accomplished technology executive with 20 years’ experience.
The four areas in which agencies have made significant progress are: Managingrisks to safety and security; Bringing AI talent into government; Advancing responsible AI innovation; and Advancing U.S. leadership abroad. Reporting should begin by September 1, 2025. To register, click here.
AI leadership, including the creation of a task force focused on datacenter infrastructure. The priority areas are: Asset Management Vulnerability Management Defensible Architecture Cyber Supply Chain RiskManagement (C-SCRM) Incident Detection & Response Each priority area includes further alignment goals to address these variations.
Featured Speakers: Martin Stanley × Martin Stanley AI & Cybersecurity Researcher Martin Stanley, AI and Cybersecurity Researcher, leads the NIST AI RiskManagement Framework (AI RMF) efforts at the U.S. Prior to his federal service Martin held executive leadership positions at Vonage and UUNET Technologies.
Canadian Parliament is currently prorogued until March 24, 2025 while the Liberal Party undertakes a leadership race to replacement current Prime Minister Justin Trudeau; however, the leader of the opposition is calling the House of Commons to be recalled in order to address the perceived economic crisis resulting from the U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content