This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Leadership approval must be sought, and officials must be apprised of progress. A recent whitepaper from CDW Government, “How a Modernized IT Environment… A recent whitepaper from CDW Government, “How a Modernized IT Environment…
Featured Speakers: John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
Tuesday, February 13, 2024 | 2:00PM EST | 1 Hour | 1 CPE State and local governments had to adapt quickly to the effects of the pandemic, as workers and residents alike were encouraged to shelter in their homes. This created major challenges for agencies’ IT systems and technical support staff. He has twice been awarded Jessie H.
To view this webinar: Generative AI in Government. Kyle’s team leads initiatives that focus on providing IT modernization services to the government and to industries such as healthcare and energy. Kyle was recognized by WashingtonExec as a Top Chief Technology Exec to Watch in 2023. He is also a 2018 Federal 100 award winner.
Thursday, January 18, 2024 | 2:00PM EST | 1 Hour | Training Certificate State and local governments and education produce large amounts of unstructured data in a wide range of data types. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educational and government operations.
Close Principal Technologist, Public Sector, Akamai John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join thought leaders in government and industry to discuss how Apple products are changing the IT landscape from one of mandates to one of choice. Citizenship & Immigration Services (USCIS). Close Mac Program Manager, U.S. He has twice been awarded Jessie H.
Governments globally are grappling with how to best balance incentives, support, and direct oversight. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
Thursday, January 11, 2024 | 2:00PM EST | 1 Hour | Training Certificate Recent headlines have been full of stories about state and local governments and school systems being targeted by malicious actors. And these organizations are likely to face tight budgets and limited manpower to deal with a cyber threat.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss how agencies can incorporate the DMD directives and recommendations to reinforce and maximize the benefits of their ZT architecture. He has twice been awarded Jessie H.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda As government agencies continue to leverage APIs for critical functions, it’s imperative to prioritize robust security measures to safeguard against potential threats and breaches. He has twice been awarded Jessie H.
Close Vice President, Product, Endpoint & Security, Lookout John Breeden II × John Breeden II Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space.
Close Chief Information Security Officer, Nuclear Regulatory Commission John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and the private sector discuss the importance of microsegmentation, how to implement it strategically, and the tools available to pursue a zero trust network environment. He has twice been awarded Jessie H.
Available on Demand | October 3, 2023 | 1 Hour | 1 CPE One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program.
At the same time, government organizations are expected to implement zero trust architectures, improve identity and access management, adopt open source software – with a software bill of materials to show its provenance and safety – find ways to incorporate AI, and practice continuous risk monitoring and mitigation.
As Americans’ expectations of government services continues to grow, harnessing generative AI (GenAI) provides leaders with opportunities to improve delivery through streamlined software development, enhanced workforce efficiency, and strategic decision-making. He has twice been awarded Jessie H.
While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate. Prior to joining HHS, La Monte worked in various cybersecurity leadership roles including CISO of Headquarters, U.S. Army specializing in IT and cybersecurity.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government agencies and the business community share their insights as they assess the current situation in dam safety programs, the current regulatory climate, and new funding opportunities for modernization.
To view this webinar: Learning From log4j: How to Keep Government Applications Secure. In addition to governing nine Bureaus, each with its own operating Bureau CISO, Sarah serves as the chairman for the Financial and Banking Information Infrastructure Committee (FBIIC) CISO Subcommittee. Close Chief Security Officer, Delaware Dept.
In 2022, more than 200 government agencies, educational institutions and healthcare organizations were victims of ransomware attacks. He earned a Certificate from GWU in Executive Leadership and graduated from West Virginia University with Honors while earning multiple Engineering Degrees. can be scattered throughout the data ocean.
Featured Speakers: John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
Over 80% of government employees use AI regularly, expanding the expectations and complexities in trusted data management. In addition to the complexities posed by the flood of data, public expectations for AI-enabled government are growing.
Prior to Rubrik, Travis held several leadership roles including the Chief Technology and Strategy Officer at BluVector, CTO at Tychon, Federal CTO at FireEye, a Principal at Intel Security/McAfee and Leader at the Defense Information Systems Agency (DISA). He has twice been awarded Jessie H.
Certified Government CIO (Honor) w/Rutgers University, Lean Six Sigma Green Belt w/Texas A&M University. The Peak Academy has trained individuals from over 300 municipal and state governments, and over 5,000 city employees, on how to improve their city processes. Past CIO of City of Irving / Farmers Branch-TX, TXMHMR and NME.
Featured Speakers: John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
Perhaps surprisingly, the biggest developments do not concern the regulation of AI under the devolved model described in the ‘pro-innovation’ whitepaper, but its displacement outside existing regulatory regimes—both in terms of funding, and practical power. Twitter announcements vs whitepaper? Comments welcome!
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss how hybrid cloud and AI intersect, steps agencies should take to monitor and streamline their IT environments, and what they can learn by using AI internally that has applicability for serving the public.
Tuesday, September 10, 2024 | 2:00PM EDT | 1 Hour | 1 CPE The compute environment is getting more and more complicated for government agencies. His track record of success, combined with his extensive knowledge and skills, make him a credible voice in the technology industry focused on solving challenges within the federal government.
He brings a strong background in public and private IT management and leadership. His leadership and skill in transforming organizations have made him an effective change agent within IT. This award is the top award in the Federal government for senior executives. He holds a Ph.D. from New Mexico State University and a B.S.
With 25+ years of technical leadership experience in the private and public sectors, he has contributed to expertise and tools that help thwart and investigate cyber attacks and insider threats. The need for robust security and resilience measures becomes paramount to the agency’s mission. He has twice been awarded Jessie H.
He brings experience as a former IT Director to helping his customers solve the unique problems of government agencies. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
He has 25+ years of technical leadership experience in private and public sector organizations, and is an internationally recognized expert in cyber risk mitigation and digital forensic investigation. The need for robust security and resilience measures becomes paramount to the agency’s mission. He has twice been awarded Jessie H.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry share their experiences with attribute-based access control and its benefits, and the challenges they faced along the way.
Tune in now on your favorite Podcasting platform to hear our experts weigh in on the crucial considerations of governance, goal alignment and accountability in crafting effective AI frameworks for government agencies. In the government space, Kurt served as the Chief Enterprise Architect at the FBI.
Close Publisher, FedInsider John Breeden II × John Breeden II Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H. Department of Labor.
Originally designed to thwart minor malicious codes, Security Operations Centers (SOC’s) have evolved over the last 50 years what they are today; centers that provide 24 hour protection, 365 days of the year to for key government organizations. Under Roser’s leadership the experiment published ~450 refereed scientific papers.
Government Security and Compliance Standards, and hands on experience in designing, implementing and managing identity and security solutions. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations.
Thursday, November 7, 2024 | 2:00PM EST | 1 Hour | 1 CPE When thinking about the use of artificial intelligence in government, it is important to consider its tactical and strategic impacts, together and separately. In the government space, Kurt served as the Chief Enterprise Architect at the FBI.
Thursday, November 7, 2024 | 2:00PM EST | 1 Hour | 1 CPE When thinking about the use of artificial intelligence in government, it is important to consider its tactical and strategic impacts, together and separately. In the government space, Kurt served as the Chief Enterprise Architect at the FBI.
After doing that for several years he moved into leadership in the InfoSec space and has been leading security teams in different capacities for the past 10 years. Craig has experience in Higher Education, Healthcare, Software Companies, and State government as well as some non-profit experience. He has twice been awarded Jessie H.
Wednesday, March 27, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Mobile devices are a way of life today – including for government agencies. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
Brendan Peter, VP, Global Government Affairs of SecurityScorecard, notes the importance of continuous risk assessment and evaluating the impact of policies to ensure they reduce cyber threats. Caddy has held senior technical and policy roles across a wide range of cybersecurity missions in the US Government. Over the past 30 years, Ms.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content