This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
When they buy technology, cities and counties will often face multiple issues, says Dean Cunningham , segment development manager, Public Safety at Axis Communications , a company that produces network cameras, access control systems, network audio devices and other IP networking solutions for physical security and video surveillance applications.
Group purchasing also gives you access to a network of vetted suppliers, simplifying the selection process. “I Sustainable procurement focuses on purchasing products and services that have minimal environmental impact, are ethically sourced, and support fair labor practices.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Close CISO, U.S.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Close CISO, U.S.
Jones is responsible for all Agency IT systems and personnel, as well as the global communications network. Prior to joining the Treasury in 2016, Sarah Nur held numerous leadership positions in systems engineering, IT network deployment (worldwide), and operational cybersecurity supporting public and private organizations.
A more specialized version of Machine Learning is deep learning, which involves training artificial neural networks on massive datasets to recognize intricate patterns and make predictions. Finance: Fraud detection, riskmanagement, and portfolio optimization. Recommendation Systems: Suggestions for books, movies, products, etc.
During the training, Jason, Liam, and Alex will cover the following topics and more: Pricing – Transactional Data Reporting (TDR)/Commercial Sales Practices (CSP); Domestic Preferences; Supply Chain; Enforcement/Mandatory Disclosure/Ethics; Sustainability Requirements/Policy; and Bid Protests Update.
Disruptions, ethical and compliance risks are more likely to occur deep in your supply chain. Alex also spent 12 years at Ariba, first building and running the spend analytics business as General Manager. That ensures accuracy, timeliness and better accessibility regardless of where a user is working. Second, map your sub-tier.
The AI WP also stresses how ‘[w] hile some regulators already work together to ensure regulatory coherence for AI through formal networks like the AI and digital regulations service in the health sector and the Digital Regulation Cooperation Forum (DRCF), other regulators have limited capacity and access to AI expertise.
He has over 25 years of industry experience in IT networking, cyber security, and data center design and implementation. He possesses an extensive knowledge of information technology, with expertise in designing, building and supporting hardware, software, networking and other information technology solutions.
In March 2024, the Office of Management and Budget (OMB) released a memo that provides more specific directions to agencies for compliance with the guidance outlined in the executive order. These training offerings cover a broad range of topics, including AI ethics, bias mitigation, model explainability, and secure AI development practices.
He has over 25 years of industry experience in IT networking, cyber security, and data center design and implementation. He possesses an extensive knowledge of information technology, with expertise in designing, building and supporting hardware, software, networking and other information technology solutions.
Network with peers from government and industry. CISA Releases Software Security Guide Federal News Network reports that the Cybersecurity and Infrastructure Security Agency (CISA) released a new guide on August 1 for Federal acquisition personnel that outlines how agencies can “better evaluate the security of the software they purchase.”
Network with peers from government and industry. DoD Exploring Portfolio-Based Acquisition Federal News Network reports that lawmakers are urging DoD to explore a portfolio-based acquisition approach that would allow the Department to invest in modern technologies more rapidly. PRISM has a $1.8
The Departments of Energy and Homeland Security will also address AI systems’ threats to critical infrastructure, and chemical, biological, radiological, nuclear, and cybersecurity risks.
The ability of AI tools to process “huge streams of data” should free up scientists “to focus on high-level directions,” the report argued, with a network of AI assistants deployed to take on “large, interdisciplinary, and/or decentralized projects.” We’re dealing with tools that, at least right now, are ethically neutral,” Press said.
NITAAC Looks to Extend CIO-SP3 by Additional Six Months Federal News Network reports that the National Institutes of Health IT Acquisition and Assessment Center (NITAAC) is seeking to extend the current expiration date of its CIO-SP3 contract vehicle by six months. CIO-SP3 is currently set to expire on April 29, 2024. AI Safety Institute.
This risk raises critical ethical and legal issues — and also poses a challenge as federal agencies ramp up their efforts to support AI research. The risk for federal agencies The LAION-5B incident raises questions for federal agencies looking to support AI research.
Success in this space requires more than just submitting bids; it demands strategy, consistency, riskmanagement, and a deep understanding of the ever-evolving rules. Ethical Procurement Public sector buyers want fairness, transparency, and responsible sourcing. Winning and keeping government contracts isnt easy.
Agencies & industry partners discuss how to modernize outdated infrastructure & secure networks with the rise of advanced technologies & a changing threat landscape. He has over 25 years of industry experience in IT networking, cyber security, and data center design and implementation. Public Sector West for Fortinet.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content