This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization. National Institute of Standards and Technology, Information Technology Laboratory.
New Risk Center adds capabilities and integrations to extend existing leadership in enabling holistic management of supplier risk. Ivalua’s Risk Center offers customers a holistic solution to actively monitor and mitigate third-party risk and compliance.
Major Ben Hunter, Deputy Chief Information Security Officer for US Army Software Factory, explained that reaching ATO first allows for transitioning to Continuous ATO, with success measured by how quickly security patches can be applied and systems recovered. He has also served as a Knowledge Manager at U.S. Marine Corps.
Nasdaq: SAIC), was named chief information security officer at V2X, according to the executive’s LinkedIn announcement. He brings to V2X years long experience in leading cyber riskmanagement and defenses against advanced persistent threats. “At the forefront of cybersecurity leadership, my role as CISO is
Featured Speakers: Jennifer Franks × Jennifer Franks Director, Information Technology & Cybersecurity Team Jennifer R. Franks is a Director in GAO’s Information Technology and Cybersecurity team. Jennifer earned a master’s degree in information security policy and management from Carnegie Mellon University.
CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5
The legislation aims to provide clearer distinctions for AI-generated content, calling on NIST to research and develop standards for “providing both authenticity and provenance information for online content.” It would also support NIST’s development of a methodology to mitigate unanticipated behavior from AI systems.
That Shark Tank format, which the agency has noted it’s used previously, allows the FBI to educate its organization about its efforts to explore the technology in a “safe and secure way,” centralize use cases, and get outcomes it can explain to leadership. That phone number serves as a way for the public to provide information to the agency.
He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. He has spent more than 15 years in supervisory leadership roles across various cybersecurity functions. He has twice been awarded Jessie H.
Prior to joining August Schell, John served as DISA’s Cyber Security RiskManagement Executive and Chief Information Officer. He was also a member of the Senior Executive Service (SES 1) and served as Director, Cyber Development Directorate, Defense Information Systems Agency (DISA), US Department of Defense.
Additional goals called out in the memo include leading an information security program grounded in technical expertise and riskmanagement, increasing the marketplace rapidly through offering additional authorization paths, and leveraging shared infrastructure in public and private relationships.
Mike is a contributing member of the Federal Mobility Group (FMG), Chair of our Department of Justice Mobile Security Working Group (MSWG), Member of the International Software Testers Qualification Board, and a board member of the Global Information Assurance Advisory Council. He has twice been awarded Jessie H.
These multifaceted issues underscore the need for a diverse, well-informed procurement team that can navigate the technical, ethical, legal and community aspects of implementing effective public safety tools while ensuring responsible use of taxpayer resources.”
Featured Speakers: La’Naia Jones × La’Naia Jones Chief Information Officer & Director, ITE As the Agency’s Chief Information Officer (CIO) and the Director of the Information Technology Enterprise (D/ITE), La’Naia J. Jones as the Acting CIO of the Intelligence Community (IC). Throughout her career, Ms.
Brian Friel , Co-Founder, BD Squared (confirmed) Kevin Plexico , Senior Vice President, Information Solutions, Deltek (confirmed) David Taylor , Founder & CEO, Federal Budget IQ Cybersecurity, Cloud, & AI Panel: What’s Next for the Federal Market? James Peake , M.D.,
Checking compliance during the regular maintenance process & transferring information. Featured Speakers: Tony Plater × Alvin “Tony” Plater Chief Information Security Officer Mr. Plater was designated the DON CISO /Senior Information Security Officer (SISO) in February 2021. Federated vs. centralized compliance.
Checking compliance during the regular maintenance process & transferring information. Featured Speakers: Tony Plater × Alvin “Tony” Plater Chief Information Security Officer Mr. Plater was designated the DON CISO /Senior Information Security Officer (SISO) in February 2021. Federated vs. centralized compliance.
The latest bid, which followed at least two previous failures, is facing similar troubles as earlier projects: incomplete planning, a technology platform with questionable maturity and, maybe most striking, the hubris of the leadership that their current plan will be successful no matter what evidence emerges that tells a different story.
Distributing agencies’ application infrastructure and workloads among different clouds has benefits, such as greater resilience, targeted cost management, and greater flexibility in the future by avoiding lock-in with one provider. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
As teams worked with suppliers through creative solutions, it became obvious that transparency and supplier riskmanagement are essential components to maintain stability during crises like these. The pandemic saw incredible growth in this area and highlighted opportunities for improvement within procurement processes and procedures.
Featured Speakers: Dr. Robert Roser × Dr. Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. He joined INL four years go.
Featured Speakers: Jay Bonci × Jay Bonci Chief Technology Officer Mr. Jason Bonci is the Department of the Air Force Chief Technology Officer at Office of the Chief Information Officer. Close Lead Systems Engineer for Cybersecurity, Navel Information Warfare Center Atlantic James Imanian × James Imanian Senior Director, U.S.
Our 32 nd Featured Contributor cohort recently kicked off, and there is already no shortage of informative and educational blogs to learn from. Peter Bonner is a cross-sector innovator, working in the areas of human capital, workforce development, and leadership effectiveness. Mr. Danforth joined Genasys Inc.
During lunch, we will hear Keynote remarks from Pat Flanders , DHA Chief Information Officer (CIO) on his current priorities and initiatives as CIO and how industry can best support them. These efforts play a pivotal role in ensuring that veterans receive the quality care and support they deserve.
Brian Friel , Co-Founder, BD Squared (confirmed) Kevin Plexico , Senior Vice President, Information Solutions, Deltek (confirmed) David Taylor , Founder & CEO, Federal Budget IQ (confirmed) The Evolving Federal Landscape of AI: What’s Next? James Peake , M.D.,
Marisol Cruz Cain, Director of Information and Cybersecurity Team for US GAO, highlights some of the unpublicized aspects of AI, like its ability to rewrite code which can make attribution difficult. Marisol has earned a master’s degree in information security from University of Maryland Global Campus. Marisol joined GAO in 2005.
Featured Speakers: Nate Fontaine × Nate Fontaine Deputy Chief Information Security Officer Nate Fontaine started his professional career as an F-16 and F-22 Crew Chief in the United States Air Force, simultaneously graduating from Christopher Newport University and Colorado Technical University. Immigration and Customs Enforcement.
An overwhelming 84% of respondents indicated that their agency leadership considers understanding the impact of generative AI as a critical or important priority level for agency operations. Significantly, 71% believe that the potential advantages of employing generative AI in their agency’s operations outweigh the perceived risks.
Improving sourcing cycle time is critical, as is having the right information in place to navigate around roadblocks and mitigate risk. Early involvement is critical, as is the ability to share and collaborate on information while still protecting your intellectual property. Riskmanagement.
Prior to joining August Schell, John served as DISA’s Cyber Security RiskManagement Executive and Chief Information Officer. He was also a member of the Senior Executive Service (SES 1) and served as Director, Cyber Development Directorate, Defense Information Systems Agency (DISA), US Department of Defense.
Redwood City, CA – October 26, 2020 – Ivalua, a leading global spend management cloud provider, and Consus, a leading global supply chain solutions provider, today announced that Jollibee Foods Corporation (JFC) has successfully deployed Ivalua’s platform to empower its procurement digital transformation, with Consus leading implementation.
He had taken on a few leadership roles in Flex such as Procurement Compliance Director, led the Global Sourcing team, and is currently member of Flex Supply Chain Council and Supply Chain RiskManagement. For more information and to register visit the event website. Louis Wong, Solutions Consultant.
Originally published on RiskManagement Monitor. A better way of looking at those relationships is as partnerships—albeit ones that require management and alignment of objectives first and foremost, but ultimately mutually beneficial relationships. Secure executive buy-in from procurement, supply chain and IT leadership.
According to the EBA guidelines, outsourcing an activity shall never: Transfer bank’s senior management responsibility of running core management functions (e.g, risk strategy & oversight of business operations). Impair riskmanagement obligations. Third Party RiskManagement. fourth-party risk).
The most fundamental spend categorization in Procurement is the line between direct and indirect spend, but one effort that transcends this split is supplier management. This includes supplier informationmanagement, supply chain riskmanagement/mitigation, and supplier performance management.
Agencies are learning how to use AI to combine multiple sources of data and proprietary information to derive actionable insights. Prior to that, Mr. Desai served as the Deputy Chief Information Security Officer for the Federal Deposit Insurance Corporation (FDIC).
In another recent report, Gartner predicted that by 2023, organizations that don’t really tackle the issue of supplier master data management will very likely have the wrong information for half of their suppliers. Provide an enterprise view of clear, comprehensive and accurate supplier information.
Such broad priorities require new supplier strategies, new information and a delicate balancing act between competing objectives. Ensuring supply continuity requires timely and open sharing of information. 50% have increased collaboration & information sharing with suppliers in the past year. It is also a major risk.
Today, they are tackling new priorities like riskmanagement, supplier compliance, actionable insights. Platforms can now pull together and merge relevant information from diverse sources into one place, including external financial figures, internal performance scorecards and risk. Making Insights Actionable.
While each municipality may be in a different position regarding each of the 5 areas described below, they all remain prime for improvement, whether from a beginning position to a more mature one or from a mature position to a leadership level. . The first step is to know which suppliers the city or county does business with.
Nowadays, Procurement practitioners primarily talk about emerging topics like the reduction of scope 3 emissions, supplier-enabled innovation and supply riskmanagement. Your leadership team plays a central role in steering this principle, from the start when launching the procurement policy and during operations. .
Brian Friel , Co-Founder, BD Squared (confirmed) Kevin Plexico , Senior Vice President, Information Solutions, Deltek (confirmed) David Taylor , Founder & CEO, Federal Budget IQ FAR Council & Beyond Panel: What’s Next? For more information, please contact Heather Tarpley at htarpley@thecgp.org. James Peake , M.D.,
He also outlined the road map for the next two years, and it’s clear Ivalua is seeking to be right up there at the leading edge of capability across the whole platform, from riskmanagement to advanced sourcing options. We are entering the “noetic age” she said, where knowledge and information is key, not products and “things”.
Featured Speakers: Chris Bunton × Chris Bunton Chief Information Officer Chris is a seasoned IT professional with over 20 years of experience and a passion for sharing knowledge. During the last 15 years, he has held Infrastructure Director and Chief Information Security Officer (CISO) positions for the state.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content