This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Close Contributing Editor , FedInsider REGISTER The post Bringing Automation to Cloud RiskManagement first appeared on FedInsider.
They address the critical cybersecurity challenges that riskmanagement requires, including alignment with zero trust architectures that agencies are mandated to implement. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He oversees riskmanagement and cybersecurity accountability for information systems, weapon systems and operational technology supporting military cyberspace operations.
To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. We’ve gathered top thought leaders who share how they are securing the playing field both inside and out with zero trust and micro-segmentation strategies that work for today’s complex environments. Tune in on your favorite Podcasting Platforms.
3 and its impact to contractors, join Crowell’s webinar on Wednesday, May 15, 2024 at 1:00 PM EDT featuring Crowell attorneys Evan Wolff and Michael Gruden in a robust discussion with one of the key architects of Rev. The post NIST Releases Final Version of NIST SP 800-171, Revision 3 appeared first on GovernmentContracts Legal Forum.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Williams, and Mickey Liebner; Mayer Brown Bipartisan, bicameral legislation in the US Congress would mandate the use of the National Institute of Standards and Technology’s (“NIST”) Artificial Intelligence RiskManagement Framework (“Framework”) by federal agencies. Register for the CMMC webinar here.
Williams, and Mickey Liebner; Mayer Brown Bipartisan, bicameral legislation in the US Congress would mandate the use of the National Institute of Standards and Technology’s (“NIST”) Artificial Intelligence RiskManagement Framework (“Framework”) by federal agencies. Webinar – Healthcare Focus: Briefing on FY24 NDAA, Feb.
To view this webinar: Be Prepared: The Cyber Wild West is Still Wild. She has led audits on government-wide cybersecurity, privacy, and information management issues, including reviews of the efficiency of federal privacy programs, the implementation of cybersecurity riskmanagement practices, and the transition to electronic records.
GSA Requesting Feedback on Draft Supply Chain RiskManagement Questionnaire The General Services Administration’s (GSA) Office of Information Technology Category has developed a supplier assurance questionnaire to gather information regarding cybersecurity supply chain riskmanagement (C-SCRM).
To view this webinar: How to Fight Threats to the Software Supply Chain. Following his honorable discharge, Nate embarked on a remarkable career with the United States Government, rising through the ranks from a contractor with multiple departments to his current position as the Deputy Chief Information Security Officer (DCISO) for U.S.
Cybersecurity, workforce transformation, and artificial intelligence (AI) were found to be the top FY25 technology priorities for the Federal Government. Don’t Miss the 2024 FPS GovernmentContracts Year in Review! To register, click here.
Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and riskmanagement processes governing use of AI, including a requirement that every agency appoint a Chief AI Officer (CAIO) before June 1. Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
The Software Acquisition Guide for Government Enterprise Consumers was created by the Information and Communications Technology Supply Chain RiskManagement Task Force, a group co-led by CISA and industry representatives.
The document, officially titled “Incident Response Recommendations and Considerations for Cybersecurity RiskManagement: A CSF 2.0 The new draft guidance also shifts the focus away from “detecting, analyzing, prioritizing, and handling incidents” to incorporating incident response into overall cybersecurity riskmanagement activities.
This is an area where government agencies can begin to explore the impact that AI and other tools can have in driving improved customer and employee experiences while thoughtfully balancing human interaction, automation, and riskmanagement. Certificates will be e-mailed to registrants. Department of Labor (DOL) and the U.S.
The AISI will create evaluation tools, test AI models and safeguards, issue guidance on AI safety and riskmanagement, and conduct technical research. AISI aims to “save the Federal Government billions of dollars while facilitating the safe and responsible implementation of AI technologies in government operations.”
Accordingly, contractors competing under OT solicitations (as well as governmentcontracting personnel) should be aware of the potential for judicial review of these kinds of acquisitions. Reporting should begin by September 1, 2025. For any assistance with registration, please contact Madyson Whiting at mwhiting@thecgp.org.
GSA will host a webinar on July 22 at 1:00 PM (ET) to discuss the changes outlined in the Refresh. Government contractors may benefit from an “Official business” exemption which would except otherwise covered transactions performed pursuant to a governmentcontract or grant. To register, click here.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Accordingly, contractors competing under OT solicitations (as well as governmentcontracting personnel) should be aware of the potential for judicial review of these kinds of acquisitions. More information on the webinars can be found below. SIZ-6281 (2024). [5] 5] NAICS Appeal of Cynergy Professional Systems, LLC, SBA No.
Seasoned practitioners in public procurement can be jaded from situations that have gone wrong, and it is common for inexperienced public buyers to experience risk aversion and fear of the unknown. Additionally, a simplistic risk transfer strategy may reduce market interest, and the number of bids submitted.
In addition, he will provide updates on the RiskManagement Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare. When not fully understood these risks can potentially impact both the JV’s GSA schedule and GSA schedules held by individual JV members.
The priority areas are: Asset Management Vulnerability Management Defensible Architecture Cyber Supply Chain RiskManagement (C-SCRM) Incident Detection & Response Each priority area includes further alignment goals to address these variations. See below for more details on both of these events.
The AISIC will develop guidelines for “red-teaming, capability evaluations, riskmanagement, safety and security, and watermarking synthetic content,” and will be housed within the U.S. The consortium is made up of over 200 organizations, including tech companies, startups, academia, state and local governments, and non-profits.
The Coalition will keep members apprised about the status of government funding as the situation warrants. Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors.
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. Webinar: What Contractors Need to Know about NIST SP 800-171 Cybersecurity, Nov.
To view this webinar: Bringing Automation to Cloud RiskManagement. Close Moderator & Contributing Editor , FedInsider The post Bringing Automation to Cloud RiskManagement (E189) first appeared on FedInsider. Ronzio started his career as an Information Technology Architect/Engineer.
Program Level: Beginner/Intermediate Delivery Method: Group Online Training * To receive a Training Certificate you must arrive on time and participate in the surveys throughout the webinar. Certificates will be e-mailed to registrants. Department of Labor (DOL) and the U.S. Department of Health and Human Services (HHS).
To view this webinar: Using Microsegmentation to Ease the Weight of Compliance. We will also dive into how machine learning and AI can be utilized to identify exactly what is on your network so you can ensure end-to-end security. Department of Labor (DOL) and the U.S. Department of Health and Human Services (HHS).
Leadership Connect is organizing two webinars for government contractors about what agencies are focusing on right now. For Federal Information Systems using cloud computing services agencies will require Federal Risk and Authorization Management Program (FedRAMP) authorization at the level determined by the agency.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content