This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
With over 25 years in telecommunications, Scott has been a key leader in the FirstNet program since its inception, driving innovations like integrating mission critical push-to-talk with land mobile radio systems and expanding coverage with solutions like FirstNet MegaRange. His leadership ensures a [.]
The Federal Acquisition Service provides buying platforms and acquisition services to Federal, DoD, State and Local governments for a broad range of items from office supplies to motor vehicles to information technology and telecommunications products and services.
Her focus areas included Data Centers, Data Systems/Services, Storage, Virtual Desktop Infrastructure (VDI), Continuity of Operations (COOP), Disaster Recovery, Inside/Outside Plant Telecommunication Cable Distribution, Networking, and Cooperative Research and Development Agreements (CRADAs).
And integrating 5G into legacy systems requires that compatibility is a priority. He has more than 22 years of experience in the telecommunications industry and has held technical leadership positions at top technology companies, startups, and research labs. Allocating the radio spectrum requires careful, efficient management.
Jeremy has over 23 years of security and leadership experience and over 8 years of service working for the State of Texas at DIR, DPS. He has held security, telecommunications and I.T. Jeremy and his team also oversee the TX Volunteer Incident Response Team (VIRT) which has 99 personnel with cybersecurity, I.T.
The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD’s Joint All-Domain Command and Control Strategy, also unveiled last year. He graduated with a Ph.D. in Information Sciences in June 2022.
At the same time, historically-offline operations technology is beginning to be integrated with IT systems, opening up the OT to attacks that previously weren’t feasible. Jones brings valuable leadership, technical expertise, knowledge, and global experience to the position. Most recently, Ms.
State and local governments are preparing for the election year by leveraging federal and private sector partners along with security tools to uphold election integrity. Army providing leadership in cybersecurity, wide area networks, data centers, and IT. Prior to Maricopa County, Lester was the CISO/CPO for the City of Mesa, AZ.
Discuss how your agency works across silos to integrate CX efforts and ensure the end result is a great customer experience. Prior to participating in the SES CDP program, Adriane was the Deputy Director of the Division of Network Systems and Telecommunication within the Center for Information Technology at the NIH.
Nelson also served in multiple executive leadership roles in human capital for the Department of Education and Department of State. He also completed doctoral studies in Organizational and Leadership Development at Teacher’s College of Columbia University.
Following his graduation, Lieutenant Colonel Pimentel reported to the Deputy Commandant for Combat Development and Integration in Quantico, Virginia where he joined the Force Design Research Group. Experimentations help, but the technology and Wi-Fi integration needs to catch up, and standards must be met. He graduated with a Ph.D.
Jeremy has over 23 years of security and leadership experience and over 8 years of service working for the State of Texas at DIR, DPS. He has held security, telecommunications and I.T. Jeremy and his team also oversee the TX Volunteer Incident Response Team (VIRT) which has 99 personnel with cybersecurity, I.T.
The threat of mis-, dis-, and mal-information (MDM) that aims to undermine the public’s confidence in election integrity is another concern. Army providing leadership in cybersecurity, wide area networks, data centers, and IT. Prior to Maricopa County, Lester was the CISO/CPO for the City of Mesa, AZ.
Our attention was drawn immediately towards the identity and access management ecosystem; the way threat actors abused telecommunications providers; the relationships between organizations and their outsourcing companies; and how the law enforcement ecosystem plays a vital role in deterrence,” the report noted.
And Dave Zukowski, Director of Defense Solutions for the Public Sector with Akamai Technologies warns of the risk factors, reminding everyone just because you can integrate systems, doesn’t mean you should. He has twice been awarded Jessie H.
State and local governments are preparing for the election year by leveraging federal and private sector partners along with security tools to uphold election integrity. Army providing leadership in cybersecurity, wide area networks, data centers, and IT. Prior to Maricopa County, Lester was the CISO/CPO for the City of Mesa, AZ.
This requires understanding what tools are already available, their features and functionalities, how widely deployed they are, and how different tools can be integrated to achieve priorities such as adopting identity-driven access, incorporating the principle of least privilege, and reducing an agency’s threat surface.
In addition, he will provide updates on the Risk Management Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare. These efforts play a pivotal role in ensuring that veterans receive the quality care and support they deserve.
Secondly, information technology and telecommunication have been massively incorporated and developed, facilitating not only compliance and control of obligations, but also the incorporation of non-tax services, such as e-invoices.
13, for instance, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint statement that the Chinese government (PRC) has been targeting commercial telecommunications infrastructure and compromising private communications of a small number of people primarily involved in government or political activity.
Agencies can point to both challenges and achievements in deploying this EHR system across various organizations, focusing on critical aspects such as user adoption, standardization, and the integration of innovative technologies like AI and smart devices.
Through the acquisition and integration of the Fenix Group, Loomis led the development of tactical private wireless solutions, including the Nokia 5G Banshee Flex Radio, the first 5G/LTE product for warfighters. military requirements. ” Fun fact: Loomis plays keyboard in a rock ‘n’ roll dad band.
For instance, the telecommunications breach by Salt Typhoon , a Chinese government-backed hacking group, targeted both U.S. He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006.
In 2022, Edwards served as one of the working group leads for the National Security Telecommunications Advisory Committee (NSTAC) report to the President on IT/OT Convergence. Southern Command (Feb 2000 April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.
He also provided 5G security subject matter expertise to National Telecommunications and Information Administrations Institute for Telecommunication Sciences (NTIA/ITS) for the planning and execution of the 2022 Open 5G challenge.
She is a catalyst for change, inspiring transformational leadership as a holistic wellness specialist and certified life coach, international best-selling author and motivational speaker, dance director, and a mom of three. She is passionate about empowering women to take charge of their lives and break through the glass ceiling.
Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. With a career spanning over 28 years in the technology private and public sectors, and an expert Infrastructure Architect, she integrates proven cybersecurity and disaster recovery solutions tailored to the unique needs of local government.
Leadership from both parties expect a deal that would extend the CR through March 2025 to pass before the December 20th deadline. GAP FACs goal is to modernize the Federal procurement processes by integrating emerging technologies such as AI, data analytics, cloud computing, and cybersecurity into acquisition strategies.
The full agenda explores the theme of “What is Fair and Reasonable,” with acquisition leadership from multiple agencies, including the VA, Defense Health Agency (DHA), and Defense Logistics Agency (DLA). Leadership Connect – Platinum Sponsor of the Fall Training Conference Don’t miss out!
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content