This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Featured Speakers: Bob Costello × Bob Costello Chief Information Officer Robert (Bob) Costello is the Chief Information Officer (CIO) at the Cybersecurity and Infrastructure Security Agency (CISA). .* * To receive a Training Certificate you must arrive on time and participate in the surveys throughout the webinar.
By utilizing the program, agencies can reduce their threat surface, increase visibility into the overall federal cybersecurity posture, improve federal response capabilities, and streamline Federal Information Security Modernization Act (FISMA) reporting. Close Chief Information Security Officer, U.S.
Virtually every federal agency is actively engaged in AI projects. For instance, the departments of Justice and State, as well as the Centers for Disease Control, are trying it out as a way to address voluminous Freedom of Information Act requests. Singh is passionate about process and projectmanagement.
Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & ProjectManager Alper Kerman is a security engineer and projectmanager at the National Cybersecurity Center of Excellence (NCCoE), NIST. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Yarborough was appointed Acting Deputy Chief Information Officer (DCIO) for the U.S. Within this period, La Monte also served as the Acting CIO and eventually the Director for the Operations and Management Division, where his focus was to bring secure & high-performance computing platforms to every user in OIG.
The NTIA has checked several boxes in its modernization efforts, including the creation of an implementation team with designated leadership, securing a funding source, setting outcome-oriented goals and establishing processes for progress reports to management and adapting plans.
Ivalua Spend Management Insights [ivory-search] Get Ready for Success! ProjectManager (PM): The projectmanager oversees the implementation process, coordinating activities, managing timelines, and ensuring that project objectives are met.
These multifaceted issues underscore the need for a diverse, well-informed procurement team that can navigate the technical, ethical, legal and community aspects of implementing effective public safety tools while ensuring responsible use of taxpayer resources.” Prioritize stakeholder engagement, including community input.
Featured Speakers: Ben Camerlin × Ben Camerlin SATCOM Program Manager Ben Camerlin is the Mobility and Satellite Communications (SATCOM) Program Manager in the Office of Enterprise Technology Solutions, Information Technology Category (ITC), Federal Acquisition Service (FAS).
Additional Information: Prerequisites & Advance Preparation : None required. For more information regarding concern and/or program cancellation policies please contact: Certs@FedInsiderNews.com * To receive CPE credit you must arrive on time, fill out and submit your evaluation to registration as you leave.
Featured Speakers: Jay Bonci × Jay Bonci Chief Technology Officer Mr. Jason Bonci is the Department of the Air Force Chief Technology Officer at Office of the Chief Information Officer. Close Lead Systems Engineer for Cybersecurity, Navel Information Warfare Center Atlantic James Imanian × James Imanian Senior Director, U.S.
Walter-Beam joined Two Six in August 2021, bringing over 20 years of management and leadership experience, and a not-so-traditional path to GovCon compliance. She was quick to take on new challenges in procurement, subcontracts, projectmanagement and compliance. She started her career in the U.S.
They have impressive government and industry experience and will cover topics such as IT; diversity, equity and inclusion; workforce management; process improvement; leadership; career building; and customer experience, to name just a few. Moffat is a mom, civil servant, community volunteer, and leadership coach.
Election officials and workers could face doxing – releasing personal information online – and other actions such as “swatting,” or calling 9-1-1 to falsely report a violent crime at an address to trigger a police response. Lester has taught at the collegiate level for over 12 years in the areas of technology, business and projectmanagement.
To view this webinar: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust. Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & ProjectManager Alper Kerman is a security engineer and projectmanager at the National Cybersecurity Center of Excellence (NCCoE), NIST.
Whether you're a CEO, a projectmanager, or a team leader, you're well aware of the importance of effective collaboration within your organization. So, let's dive into the realm of cross-functional collaboration and discover valuable insights and tips that can help you excel in your leadership role. Let's get started!
Working collaboratively is often complex, involving internal stakeholders beyond the procurement function too, which highlights another critical success factor – the need for effective programme and projectmanagement. That’s not something many procurement professionals traditionally consider. .
Yarborough, Acting DCIO, CISO and Executive Director, Office of Information Security, HHS, shares HHS is tasked with protecting 1200+ networks every day. Yarborough was appointed Acting Deputy Chief Information Officer (DCIO) for the U.S. Department of Homeland Security (DHS) and the Federal Emergency Management Agency (FEMA).
Featured Speakers: Russell Marsh × Russell Marsh Director for Cybersecurity Operations Russell Marsh is the Director for Cybersecurity Operations within the Office of the Associate Administrator for InformationManagement and Chief Information Officer at NNSA. Mr. Marsh is a retired U.S. He has twice been awarded Jessie H.
In that role, he oversees a program portfolio that includes Procurement Services, Business Service Center, and ProjectManagement Office. Moses joined OGS from the NYS Office of the Attorney General, where he served as Chief Information Officer.
I had completed several leadership programs and been promoted to high-visibility positions. I worked on high-impact company projects, and I worked with my management team to document a career path that took me all the way to corporate headquarters. But you can feel overwhelmed while wondering how to do it.
Nagesh Rao, Chief Information Officer at the U.S. Start With a Committed Team “The first thing to ensure productivity is everyone being on the same page, understanding the common shared mission and making the conscious decision to opt in to get the job done,” advised G. Department of Commerce’s Bureau of Industry and Security. “If
This additional level of requirement provides a perfect opportunity to leverage the capabilities of technology to communicate and centralize spend and supplier information state-wide. Investments in communication and outreach can help manage the constituent experience, even when most public sector procurement activities do not affect them.
Agencies are learning how to use AI to combine multiple sources of data and proprietary information to derive actionable insights. Prior to that, Mr. Desai served as the Deputy Chief Information Security Officer for the Federal Deposit Insurance Corporation (FDIC). Close Chief Information Officer, Federal Energy Regulatory Comm.
New Executive Leadership for Enterprise Technology Solutions On February 16, 2023, Jake Marcellus became the Executive Director for Enterprise Technology Solutions (ETS). In addition to meeting with agency Chief Information Office (CIO) staff, Jake is also meeting with executives of our EIS contractors.
Ivalua was also awarded the the best P2P Specialist Provider by an independent panel of industry veterans at the 2020 World Procurement Awards and This release will support extending its leadership by delivering ever greater value to customers. Specific release highlights include: Supplier Management Innovations: .
Lisa Jammer, Director of People and Culture for the Texas Department of Information Resources (DIR), recommends focusing on the following objectives. Responding to technology issues may take information, and it may take hardware. “If We have all these platforms — Teams and Zoom — that we use for talking about projects and due dates.
Efficient communication, the ability to securely share information and project-manage efforts are all key to scaling collaboration across more processes, suppliers & categories. Find more resources from Ivalua’s marketplace to inspire and inform you. All leading P2P solutions can address this.
The second most effective strategy specified to improve collaboration was deploying technology to enable better information sharing with suppliers (63%). And 56% specified technology to help better manage communications and planning with suppliers. Technology can also directly enable improved collaboration.
Set sustainability criteria Heavily informed by the European Commission’s recommended green criteria, Lithuania set criteria for 18 product categories, including paper, office equipment, computers and screens, electricity, etc. Very instrumental for all,” said Kęstutis Kazulis of the LPPO. Resources: How to engage with the market 8.
Our users and indeed our own teams also want speed in terms of rapid access to data and information. Being able to manage the activities between suppliers and our own organisation in a structured projectmanagement sense is key, as is the ability to share information, documents or plans easily and securely.
Keep the Cards on the Table When you need to check in on a project, said Bill Brantley, Senior Training Specialist in the Navy Inspector General Office, email isn’t always the best solution. Online product management or workflow tools can keep things moving, even when a team member can’t respond.
Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. Close IT Infrastructure & Security Manager, City of Fairfield, CA Jennifer Franks × Jennifer Franks Director, Center for Enhanced Cybersecurity Jennifer R. Franks is a Director in GAO’s Information Technology and Cybersecurity team.
Featured Experts: James Scobey × James Scobey Chief Information Security Officer James Scobey serves as the Chief Information Security Officer for the U.S. Mr. Scobey has over 25 years of federal and private sector experience in information technology. Close Chief Information Security Officer, U.S.
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
Featured Speakers: Jothi Dugar × Jothi Dugar Chief Information Security Officer, CIT With over 25 years of experience, Jothi Dugar is a leading cybersecurity executive who knows what it’s like to be the only female executive in the room. During her tenure there, she developed and led the Information Security Office.
Featured Speakers: Mark Modisette × Mark Modisette Zero Trust Technologist Zero Trust Technologist, Mark Modisette is a veteran information assurance and security executive with more than 20 years of experience in multiple industry sectors. He holds a Master of Science In Information Technology from Florida Tech.
In a Harvard Business Review article , business leadership expert Denise Lee Yohn observed, “A company cannot expect to deliver a tech-enabled, seamless, and intuitive CX … if everything it does with employees is on paper, slow, and bureaucratic.” Every organization has internal systems or processes that frustrate employees.
CPE credit in Business Management & Organization.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. Featured Speakers: Paul Blahusch × Paul Blahusch Chief Information Security Officer Paul Blahusch has over 20 years of cyber and IT security experience with the U.S.
Featured Experts: Lester Godsey × Lester Godsey Chief Information Security Officer Lester Godsey is the Chief Information Security Officer for Maricopa County, leading all cybersecurity and data privacy efforts for the organization. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization. National Institute of Standards and Technology, Information Technology Laboratory.
.* Additional Information Prerequisites & Advance Preparation: None required. By registering for this webcast, the personal information you provide on this site may be shared with KPMG LLP and you may be contacted regarding the firm’s products and solutions. For more information: KPMG Privacy Statement.
Jothi Dugar, CISO at NIH’s Center for Information Technology emphasizes the age-old advice, communication is key. She is a catalyst for change, inspiring transformational leadership as a holistic wellness specialist and certified life coach, international best-selling author and motivational speaker, dance director, and a mom of three.
Richard LaTulip, Field Chief Information Security Officer, Recorded Future, addressed resistance to AI in cybersecurity, warning that the overwhelming volume of attacks makes proper automation essential for staying competitive. To view this webinar: Automation as a Cybersecurity Resource. Bob is a nine-year veteran of the U.S
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content