This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Close Contributing Editor , FedInsider REGISTER The post Modernizing Dam Safety – Digital Innovations for Proactive Monitoring & Mitigation Strategies first appeared on FedInsider. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
In this episode of Feds in the Field, we’ll explore how the National Air and Space Museum leveraged an innovative combination of server, display and networking technology to overhaul its… However, a re-examination of its legacy infrastructure pushed the museum to transform the exhibit experience for a new generation.
The State Department is developing countermeasures to prevent foreign adversaries from exploiting 5G or future 6G networks and the Internet of Things to target U.S. diplomats abroad, according to the department’s Cybersecurity-Supply Chain Risk Management and Emerging Technologies Working Group lead.
We’ll explore ways that government agencies are using technology to transform how they deliver services impacting the health, safety, and security of their people. Certificates will be e-mailed to registrants.
And with the increased use of remote computing, the cyber attack surface grows as more edge devices are added to networks. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity. In the face of new and growing threats many federal, state and local IT budgets stay the same, however.
Tune in now on your favorite Podcasting platform to hear our experts weigh in on which use cases can make this innovative technology sustainable and trustworthy. In this role, he leads the Agency’s IT innovation and AI programs, and is responsible for IT architecture and design. To view this webinar: Generative AI in Government.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
His passion lies in translating mission needs into innovative cybersecurity solutions, ensuring federal agencies can strengthen their security posture in an evolving threat landscape. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.
Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes.
His experience spans driving innovation as a cybersecurity leader for global organizations and CISOs to corporate executive building products and services. DoD, he has been awarded the Annual Individual Award for Defending the DoD’s Networks. Certificates will be e-mailed to registrants. As a Cyber Leader in the U.S
The author of numerous trade journal and online magazine articles, he is CISM (Certified Information Security Manager) and PMP (Project Management Professional) certified. He leads the Network Operations, Cybersecurity, and Outside Plant functions. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan is VP, Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics.
His experience spans driving innovation as a cybersecurity leader for global organizations and CISOs to corporate executive building products and services. DoD, he has been awarded the Annual Individual Award for Defending the DoD’s Networks. As a Cyber Leader in the U.S
She was also named to the World Economic Forum Young Scientist List and the MIT Technology Review World’s Top 35 Innovators under the Age of 35 list and is a Senior Member of the National Academy of Inventors. Amanda received her Ph.D. in Applied Physics from Harvard University as a DOE Computational Graduate Fellow and NSF Fellow.
For most of his 20+ years in technology he has been focused on innovative datacenter technologies, most recently data protection solutions. Featured Speakers: Aaron Lewis × Aaron Lewis Head of Public Sector Sales Engineering Aaron Lewis is the Regional Vice President for US Public Sector Sales Engineering at Rubrik.
Featured Speakers: Eoghan Casey × Eoghan Casey Vice President of Cybersecurity Strategy & Product Development Eoghan Casey is Vice President of Cybersecurity Strategy & Product Development at Own, creating innovative solutions for SaaS data protection and security analytics.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
His knowledge of change management, data center consolidation and operations, network design and deployment and IT services management, coupled with his outstanding reputation and record of performance within the Department of Justice positioned him well to be a transformation agent.
Prior to joining the Treasury in 2016, Sarah Nur held numerous leadership positions in systems engineering, IT network deployment (worldwide), and operational cybersecurity supporting public and private organizations. Where he was responsible for the security of a complex, 90-site international manufacturing and corporate network.
Featured Speakers: Karl Mattson × Karl Mattson Chief Information Security Officer Karl is a cybersecurity leader and innovator who serves as the CISO for Noname Security. He has over 25 years experience leading innovative and diverse teams of technology and security professionals in financial services, retail and federal government.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
This week on Feds At the Edge, we explore how this innovative technology can revolutionize the way our government runs. Karen Hay, Digital Health Transformation Lead for the Global Public Sector with Salesforce sums it up perfectly, “Generative AI can unlock the knowledge trapped in data.”
Angelica Phaneuf, CISO with US Army Software Factory (formerly Kessel Run) known for their innovations, offers practical tips for deploying ZTA, emphasizing assembling a diverse toolkit for micro-segmentation success. This week on Feds At the Edge, we are breaking the system into tiny little pieces.
The author of numerous trade journal and online magazine articles, he is CISM (Certified Information Security Manager) and PMP (Project Management Professional) certified. He leads the Network Operations, Cybersecurity, and Outside Plant functions. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
Mangala also serves as the Director of Technology, Innovation and Engineering, responsible for overseeing the development and operations of the department’s Enterprise Data Platform and Artificial Intelligence and Machine Language strategies and policies.
In this role, John was responsible for managing risk in the cyber domain and ensuring security throughout DISA and the Department of Defense Information Network (DoDIN). His portfolio included mobility, networks operations, cybersecurity, and innovation.
Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge , we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “ zero trust model.” Limiting our understanding to “the main and the plain” could lead to trouble.
The author of numerous trade journal and online magazine articles, he is CISM (Certified Information Security Manager) and PMP (Project Management Professional) certified. He leads the Network Operations, Cybersecurity, and Outside Plant functions. Army providing leadership in cybersecurity, wide area networks, data centers, and IT.
So OCP supported Vitaliy Trenkenshu and his Datanomix team to prepare for the prestigious World Commerce & Contracting Innovation & Excellence Awards in 2021. This stage took place offline. BootCamp participants discussed public procurement in Central Asian countries, presented their projects and learned how to use new tools.
However, there’s a certain amount of competition that is good that does allow agencies to continue to focus on innovation, continue to focus on delivering the right products, service mix. I wrote an article in the NCMA magazine a couple of years ago where I call it the challenge of the decade, and it truly is.
Peter Bonner is a cross-sector innovator, working in the areas of human capital, workforce development, and leadership effectiveness. Over her career she has been a national award-winning magazine writer and editor, TV reporter and newsroom supervisor, and EMMY-nominated producer. in Symbolic Systems and a coterminal M.A.
Other innovations under his leadership included the first-ever National Poll Worker Recruitment Day, which led national recruitment efforts to alleviate concerns about a significant shortage in poll workers due to the pandemic. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
The Army Esports team affords its members access to hardware and network speeds most players drool over, while they're trained for careers in the military and beyond. For more on military innovations, try these stories: U.S. If you enjoyed this video, check out the rest of our Feds in the Field series.
As the largest military force in the world, one with a global network of communications and IT systems, it is critically important to be able to see and protect the health of those systems. Stretch focuses on identifying customers challenges and designing innovative cybersecurity solutions to solve their complex problems.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
Working in a ZT-based environment makes the addition of innovative technologies such as cloud computing and AI safer; every new technology introduces new risks and attack vectors, but the ZT approach never trust, always verify provides robust security and helps prevent lateral movement through networks.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
Luke Keller, Chief Innovation Officer at the US Census Bureau, explains AI’s role in handling massive datasets, enhancing earth observation for accurate population counting, automating data ingestion, and metadata classification. Luke is currently working as the Chief Innovation Officer at the U.S. Close Deputy CIO, U.S.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
Luke Keller, Chief Innovation Officer at US Census bureau, highlighted using NIST guidelines, including bias reduction frameworks, to ensure ethical and accurate AI deployment. Close Deputy Chief Innovation Officer, U.S. Luke is currently working as the Chief Innovation Officer at the U.S. Prior to this, Luke held roles as a Sr.
As the largest military force in the world, one with a global network of communications and IT systems, it is critically important to be able to see and protect the health of those systems. Stretch focuses on identifying customers challenges and designing innovative cybersecurity solutions to solve their complex problems.
Among the innovative ways agencies are responding to the ever-evolving threat landscape are expanded collaboration between federal and state/local agencies, initiatives such as Zero Trust to raise the security bar, and FedRAMP/StateRAMP vehicles to provide a uniform security baseline. Certificates will be e-mailed to registrants.
Throughout his career, Jeffrey has served as the Senior Technical Advisor to Senior Military Leaders and performed in both Network and System Engineer positions specializing in developing hybrid GOTS and COTS systems that supported global strategic and tactical missions and initiatives. Special Operations communities.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content