This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. Just this year, CISA announced that all 23 departments and agencies covered by the CFO Act are now sharing cyber risk information with CISA through their CDM agency dashboards.
Friday, October 13, 2023 | 2:00PM EDT | 1 Hour | 1 CPE In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. and its allies and partners.
In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Tune in on your favorite Podcasting Platforms.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Embracing the Amazon Leadership Principles fosters a culture of customer obsession, ownership, and experimentation. Doing so has supported my capabilities and success delivered on behalf of my public sector customers, who I’ve witnessed embracing the Leadership Principles. Embracing the Leadership Principles Fast forward to 2024.
Featured Speakers: Bob Costello × Bob Costello Chief Information Officer Robert (Bob) Costello is the Chief Information Officer (CIO) at the Cybersecurity and Infrastructure Security Agency (CISA). framework and implemented zero trust solutions at the network level. Certificates will be e-mailed to registrants.
Major Ben Hunter, Deputy Chief Information Security Officer for US Army Software Factory, explained that reaching ATO first allows for transitioning to Continuous ATO, with success measured by how quickly security patches can be applied and systems recovered. serves as Director, G36 Cyber Defense and Network Operations, U.S.
The resolution encourages each federal agency to recognize the day by sharing the stories of the agency’s own whistleblowers and informing their employees about their right to blow the whistle. The resolution was introduced by Senator Chuck Grassley, co-founder and co-chair of the Senate Whistleblower Protection Caucus.
He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.
Participants can earn up to 3 CPE credits in Information Technology.* Additional Information: Prerequisites & Advance Preparation : None required. He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006.
The Certification Program is a crucial tool in ensuring that employees are informed of their whistleblower rights and protections. The OSC is putting real teeth behind the Senate’s resolutions, and showing leadership on this issue.” 2302(c) Certification Program to promote NWAD as part of their annual re-certification.”
As we celebrate, we find ourselves at the crossroads of progress and potential, confronting the myths holding women back from participating in public procurement and attaining certain heights in leadership. The post 10 common myths holding women back in government contracting and leadership appeared first on Open Contracting Partnership.
AWS Partner ScaleCapacity automated the Nebraska Judicial Branch’s document management system and introduced a generative AI feature, with the goal to enable attorneys to swiftly access data and information from any case exhibit. Join the AWS Partner Network or find and work with one of our partners today.
Featured Speakers: Nate Fontaine × Nate Fontaine Deputy Chief Information Security Officer Nate Fontaine started his professional career as an F-16 and F-22 Crew Chief in the United States Air Force, simultaneously graduating from Christopher Newport University and Colorado Technical University. Immigration and Customs Enforcement.
Previously, she led IBM businesses in the Smarter Cities and Collaboration markets, as well as, spending 3 years working in Emerging Markets developing information management businesses in select countries. Akiba started her career with an IBM business partner primarily serving Federal Government clients. Akiba is a Washington D.C.
He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.
Employees’ home workstations may not always be connected to the organization’s network and users may be connected through a slow VPN, which presents unique challenges for maintaining a compliant environment. Certificates will be e-mailed to registrants.
Kyle holds a master’s in technology management from George Mason University and a bachelor’s in management information systems from George Mason University. He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE. He has twice been awarded Jessie H.
Introduction of the radio was just as important in World War I, while radar and sonar – other forms of conveying crucial information – played an important role in World War II. For instance, 5G networks must have state-of-the-art security and encryption, since they will be targets of cyber attacks, espionage and data breaches.
Throughout his career, Stephen has demonstrated his capabilities in various roles, from technical operations to leadership and management. Stephen’s extensive technical background includes a broad array of certifications and licenses, showcasing his depth of knowledge and proficiency in cybersecurity and network architecture.
And with the increased use of remote computing, the cyber attack surface grows as more edge devices are added to networks. Featured Speakers: Jonathan Feibus × Jonathan Feibus Chief Information Security Officer Jonathan Feibus serves as the Chief Information Security Officer for the Nuclear Regulatory Commission.
industry and academia who work with systems, sub-systems, components, and the enabling technologies related to the use of the electromagnetic spectrum or the information that rides on it. enterprise, non-terrestrial network and public sector customers. The NSC provides the Government direct access to over 350 members of U.S.
Thursday, August 22, 2023 | 12:00PM – 5:00PM EDT | 3 CPE | Reston, VA 5G networks have become more common over the past few years. At the 5G Americas conference in October 2023, the keynote speaker said the U.S./Canada Canada region leads the world in 5G subscription penetration (41%), followed by China (33%), and Europe (just 13%).
The National Telecommunications and Information Administration has awarded $42.3 million in funding for the Acceleration of Compatibility and Commercialization for Open RAN Deployments project.
Key Takeaways Women-owned business certification enhances access to federal contracts, improves credibility, and facilitates valuable networking opportunities. providing a wide network of support. The SBA may request additional information or clarification during the application process. Proof of U.S.
He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.
Franks is a Director in GAO’s Information Technology and Cybersecurity team. Jennifer also leads the team’s ongoing assessment of information technology and cybersecurity issues during the coronavirus pandemic. Jennifer earned a master’s degree in information security policy and management from Carnegie Mellon University.
Throughout the day, attendees will have the opportunity to hear from FAS leadership on their current priorities, programs, and initiatives moving forward. In addition, the popular “Rogers Panel” will be returning, highlighting the key developments in acquisition law, policy, and regulation. We look forward to seeing you at the conference!
He began his career at Cisco, serving as CIO, Customer Advocacy for over a decade, where he honed his understanding of network security methodologies and customer-oriented approaches. Jeremy has over 23 years of security and leadership experience and over 8 years of service working for the State of Texas at DIR, DPS.
The spread of 5G was accelerated by the pandemic, as agencies and businesses alike had to transition to a work-from-home environment, requiring at-home workers to have the same network performance and access as they did in the office. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Our guests will share how to get started by taking advantage of the free services CISA provides which will bring local areas up to a more mature model of cybersecurity so they can make better informed decisions about their funding measures. Of those years, Roemer spent two in the White House and eight years working for the state of Arizona.
An important tool in pursuing zero trust is to implement microsegmentation – partitioning a network into small, isolated sections to reduce the attack surface in each section, prevent lateral movement across networks, and lower risk. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.
He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.
For instance, the departments of Justice and State, as well as the Centers for Disease Control, are trying it out as a way to address voluminous Freedom of Information Act requests. He has been in numerous leadership roles in the private sector for over 25 years, spanning accounting, finance, technology & operations management spheres.
He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.
He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.
He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. .* * To receive a Training Certificate you must arrive on time and participate in the surveys throughout the webinar. Certificates will be e-mailed to registrants.
This collaboration enables customers to find new suppliers and access accurate, comprehensive supplier information including diversity status, compliance, certifications and much more. Ivalua has seen accelerating growth and recognition of its leadership in recent years.
This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly. The NSC provides the Government direct access to over 350 members of U.S.
Featured Speakers: La’Naia Jones × La’Naia Jones Chief Information Officer & Director, ITE As the Agency’s Chief Information Officer (CIO) and the Director of the Information Technology Enterprise (D/ITE), La’Naia J. Jones as the Acting CIO of the Intelligence Community (IC). Throughout her career, Ms.
As the Field Chief Technology Officer at Axonius Federal, he leverages deep technical expertise and strategic leadership to help government agencies tackle their most complex cybersecurity challenges. Stretchs career is defined by his success in technical leadership and his deep federal experience. He has twice been awarded Jessie H.
He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content