This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter – suddenly the systems had to become decentralized, distributed and open to remote workers.
Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. Over this 14 year tenure, he had numerous roles in the public sector, including engineering management and as an individual contributor in systems engineering and web applications.
In this role, John was responsible for managing risk in the cyber domain and ensuring security throughout DISA and the Department of Defense Information Network (DoDIN). His portfolio included mobility, networks operations, cybersecurity, and innovation. He is also an Eagle Scout.
Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge , we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “ zero trust model.” Limiting our understanding to “the main and the plain” could lead to trouble.
Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. While at the Pentagon with HQDA CIO/G-6, he served in leadership roles for strategic initiatives managing an Army-wide IT reform and network modernization effort. security agencies.
DoD Looks to Increase Small Business Opportunities Through National Defense Industrial Strategy According to Federal News Network , the Department of Defense (DoD) National Defense Industrial Strategy provides an opportunity for it to be “more approachable for small businesses.” We look forward to your participation!
In addition to distributing critical funding, the EAC strategically pivoted resources to help election officials as they confronted obstacles and made difficult decisions of how to best run their elections. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Certificates will be e-mailed to registrants. He has been with the County for 1 ½ years.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content