This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The federal government collects and produces almost unimaginable amounts of information. And that’s just static information; every day there’s another report or whitepaper or written testimony that must be absorbed. The — 914 million unique files.
On January 17 th the Coalition for Common Sense in Government Procurement (the Coalition) launched the Government Procurement Efficiency List (GPEL) seeking recommendations from our members and stakeholders across the procurement community on opportunities to increase the efficiency and effectiveness of the federal procurement system.
A recent whitepaper from CDW Government, “How a Modernized IT Environment… At its most basic level, however, federal IT modernization initiatives focus on two elements: applications and infrastructure. Applications perform specific tasks, and infrastructure provides the foundation for managing those resources.
Featured Speakers: John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
The Cybersecurity and Infrastructure Security Agency is looking for feedback on its “secure by design” whitepaper, which pushes software manufacturers to follow more stringent security principles in the design and development of all products shipped to customers.
Tuesday, February 13, 2024 | 2:00PM EST | 1 Hour | 1 CPE State and local governments had to adapt quickly to the effects of the pandemic, as workers and residents alike were encouraged to shelter in their homes. This created major challenges for agencies’ IT systems and technical support staff. He has twice been awarded Jessie H.
Together with colleagues at the Centre for Global Law and Innovation of the University of Bristol Law School, I submitted a response to the UK Government’s public consultation on its ‘pro-innovation’ approach to AI regulation. For an earlier assessment, see here. Available at SSRN: [link].
To view this webinar: Generative AI in Government. Kyle’s team leads initiatives that focus on providing IT modernization services to the government and to industries such as healthcare and energy. Kyle was recognized by WashingtonExec as a Top Chief Technology Exec to Watch in 2023. He is also a 2018 Federal 100 award winner.
Thursday, January 18, 2024 | 2:00PM EST | 1 Hour | Training Certificate State and local governments and education produce large amounts of unstructured data in a wide range of data types. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educational and government operations.
This week in federal government contracting saw some important stories, including the one-year anniversary of the SBA takeover of the SDVOSB program and the new defense industrial strategy. We hope that you are staying warm in your neck of the woods.
The Coalition for Common Sense in Government Procurement (the Coalition) continues to collect recommendations for the Government Procurement Efficiency List (GPEL). Open market purchases via government credit card increase costs and supply chain risks. Thank you to all those who have submitted recommendations.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join thought leaders in government and industry to discuss how Apple products are changing the IT landscape from one of mandates to one of choice. Citizenship & Immigration Services (USCIS). Close Mac Program Manager, U.S. He has twice been awarded Jessie H.
Close Principal Technologist, Public Sector, Akamai John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
Tuesday, October 24, 2023 | 2:00PM EDT | 1 Hour | 1 CPE AI will revolutionize how the government delivers on its mission. With AI, Government organizations can enhance decision-making, speed up service delivery, and improve operational efficiencies. He has twice been awarded Jessie H.
Thursday, January 11, 2024 | 2:00PM EST | 1 Hour | Training Certificate Recent headlines have been full of stories about state and local governments and school systems being targeted by malicious actors. And these organizations are likely to face tight budgets and limited manpower to deal with a cyber threat.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda As government agencies continue to leverage APIs for critical functions, it’s imperative to prioritize robust security measures to safeguard against potential threats and breaches. He has twice been awarded Jessie H.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry explore the latest developments in cybersecurity. government policies, programs, and initiatives. He has twice been awarded Jessie H.
Close Vice President, Product, Endpoint & Security, Lookout John Breeden II × John Breeden II Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space.
Close Chief Information Security Officer, Nuclear Regulatory Commission John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space.
Governments globally are grappling with how to best balance incentives, support, and direct oversight. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
Close Director, Technical Solutions, August Schell John Breeden II × John Breeden II Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and the private sector discuss the importance of microsegmentation, how to implement it strategically, and the tools available to pursue a zero trust network environment. He has twice been awarded Jessie H.
At the same time, government organizations are expected to implement zero trust architectures, improve identity and access management, adopt open source software – with a software bill of materials to show its provenance and safety – find ways to incorporate AI, and practice continuous risk monitoring and mitigation.
As Americans’ expectations of government services continues to grow, harnessing generative AI (GenAI) provides leaders with opportunities to improve delivery through streamlined software development, enhanced workforce efficiency, and strategic decision-making. He has twice been awarded Jessie H.
No question, more local governments are facing cyber threats in 2024, says Tim LeMaster, vice president, worldwide systems engineering at Lookout. The following link includes Lookout case studies and whitepapers and other resources. He notes that a ransomware attack on local government can often be overlooked.
To view this webinar: Learning From log4j: How to Keep Government Applications Secure. In addition to governing nine Bureaus, each with its own operating Bureau CISO, Sarah serves as the chairman for the Financial and Banking Information Infrastructure Committee (FBIIC) CISO Subcommittee. Close Chief Security Officer, Delaware Dept.
Perhaps surprisingly, the biggest developments do not concern the regulation of AI under the devolved model described in the ‘pro-innovation’ whitepaper, but its displacement outside existing regulatory regimes—both in terms of funding, and practical power. Twitter announcements vs whitepaper? Comments welcome!
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government agencies and the business community share their insights as they assess the current situation in dam safety programs, the current regulatory climate, and new funding opportunities for modernization.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss how agencies can incorporate the DMD directives and recommendations to reinforce and maximize the benefits of their ZT architecture. Department of Defense (DoD) and the intelligence community.
Featured Speakers: John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
Over 80% of government employees use AI regularly, expanding the expectations and complexities in trusted data management. In addition to the complexities posed by the flood of data, public expectations for AI-enabled government are growing.
Available on Demand | October 3, 2023 | 1 Hour | 1 CPE One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. He has twice been awarded Jessie H.
This seems to follow from the Government’s position that ‘ acknowledge[s] concerns from respondents that rushing the implementation of a duty to regard could cause disruption to responsible AI innovation.
While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. He has twice been awarded Jessie H.
Certified Government CIO (Honor) w/Rutgers University, Lean Six Sigma Green Belt w/Texas A&M University. The Peak Academy has trained individuals from over 300 municipal and state governments, and over 5,000 city employees, on how to improve their city processes. Past CIO of City of Irving / Farmers Branch-TX, TXMHMR and NME.
Featured Speakers: John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss how hybrid cloud and AI intersect, steps agencies should take to monitor and streamline their IT environments, and what they can learn by using AI internally that has applicability for serving the public.
Tuesday, September 10, 2024 | 2:00PM EDT | 1 Hour | 1 CPE The compute environment is getting more and more complicated for government agencies. His track record of success, combined with his extensive knowledge and skills, make him a credible voice in the technology industry focused on solving challenges within the federal government.
In 2022, more than 200 government agencies, educational institutions and healthcare organizations were victims of ransomware attacks. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. can be scattered throughout the data ocean.
He brings experience as a former IT Director to helping his customers solve the unique problems of government agencies. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
Close Chief Technology Officer, Public Sector, Rubrik John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space. He has twice been awarded Jessie H.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry share their experiences with attribute-based access control and its benefits, and the challenges they faced along the way.
Close Vice President of Cybersecurity Strategy & Product Development, Own Company John Breeden × John Breeden Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space.
A few requirements include your business’ Capabilities Statement as well as a whitepaper about concepts, strategies and potential gaps. Our Government Procurement Advisors can help you successfully submit a bid for this contract. Our Government Procurement Advisors can help you successfully submit a bid for this contract.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content