This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Close Contributing Editor , FedInsider REGISTER The post Bringing Automation to Cloud RiskManagement first appeared on FedInsider.
Riskmanagement, cost reduction and digital transformation — these are the three top priorities for procurement organisations in the Middle East today, according to a global survey conducted by Ivalua’s global partner PwC. How do these priorities impact the digital roadmap and future investments?
CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He oversees riskmanagement and cybersecurity accountability for information systems, weapon systems and operational technology supporting military cyberspace operations.
Distributing agencies’ application infrastructure and workloads among different clouds has benefits, such as greater resilience, targeted cost management, and greater flexibility in the future by avoiding lock-in with one provider. Certificates will be e-mailed to registrants.
Are ERP systems better than best-in-class supply chain solutions for managing healthcare supply chains? What are the pros and cons, and what supply chain strategy will pave the way to higher margins, improved supply chain riskmanagement in healthcare and improved patient care? What Makes a Supply Chain Solution Best-in-Class?
The audience was extremely engaged as many of them continue to look for better ways to generate the most value from the supplier selection process and ongoing supplier management. lack of integration among the ERP, PLM, contract systems, spend analytics, BI, riskmanagement, and other platforms.
At the same time, historically-offline operations technology is beginning to be integrated with IT systems, opening up the OT to attacks that previously weren’t feasible. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
To view this webinar: DoD: Embracing Continuous Monitoring. He has nearly 20 years of experience in the cybersecurity domain, with focuses on RiskManagement Framework and Software Assurance. Featured Speakers: COL Ricard Cruz × COL Ricard Cruz Director of Cyber Defense & NETOPS Colonel Richard Cruz Jr.
This event, drawing from KPMG’s vast experience with Emerging Technology and GenAI across federal and commercial sectors , aims to address the comprehensive journey of integration within federal operations. Certificates will be e-mailed to registrants.
To view this webinar: Talking Tech: Continuous Compliance for a Hybrid/Remote Workforce. He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. Federated vs. centralized compliance. Defining “end points” in an As-A-Service world. Close CISO, U.S.
To view this webinar: Talking Tech: Continuous Compliance for a Hybrid/Remote Workforce. He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. Federated vs. centralized compliance. Defining “end points” in an As-A-Service world. Close CISO, U.S.
Seasoned practitioners in public procurement can be jaded from situations that have gone wrong, and it is common for inexperienced public buyers to experience risk aversion and fear of the unknown. Additionally, a simplistic risk transfer strategy may reduce market interest, and the number of bids submitted.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He earned his BS in Integrated Science and Technology from James Madison University. Certificates will be e-mailed to registrants.
To view this webinar: Who Are You – and Can You Prove It? Identity and Access Management. Federal Technology Office James is an executive with over 30 years of experience in aviation and cyberspace operations as well as riskmanagement in these areas.
The audience was extremely engaged as many of them continue to look for better ways to generate the most value from the supplier selection process and ongoing supplier management. lack of integration among the ERP, PLM, contract systems, spend analytics, BI, riskmanagement, and other platforms.
CPO’s are now being asked to manage not only the transactional piece of the supply chain, but to also create partnerships with suppliers who are beginning to become more deeply vested in the entire product lifecycle. Challenges in this new manufacturer/supplier partnership Burton cites include: Riskmanagement. Integration.
Williams, and Mickey Liebner; Mayer Brown Bipartisan, bicameral legislation in the US Congress would mandate the use of the National Institute of Standards and Technology’s (“NIST”) Artificial Intelligence RiskManagement Framework (“Framework”) by federal agencies. Webinar – Healthcare Focus: Briefing on FY24 NDAA, Feb.
To view this webinar: Be Prepared: The Cyber Wild West is Still Wild. She has led audits on government-wide cybersecurity, privacy, and information management issues, including reviews of the efficiency of federal privacy programs, the implementation of cybersecurity riskmanagement practices, and the transition to electronic records.
The questions all go to the integrity of the data being used to assess fair and reasonable pricing. The FAS realignment provides an opportunity to address and improve data integrity and data driven decision making. Webinar: VA Covered Drug Price Updates, Oct. We look forward to seeing you all there!
Procurement Leaders Webinar. Arnaud (Ivalua) – Buyers’ objectives have expanded over the years – initially responsible for savings and cost avoidance, Byers were then tasked with handling riskmanagement, and also expected to contribute to the organization’s sustainability initiatives. .
67 percent of CIOs ranked cybersecurity in their top three areas of concern and said that security goals included improving identity and riskmanagement, modernizing infrastructure, enhancing user experience, and increasing automation. Responses to the RFI are due on November 12, 2024. To register, click here.
In the DHS strategy, leveraging current tools in a creative way can help meet zero trust implementation goals and fundamentally reduce risk. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
The priority areas are: Asset Management Vulnerability Management Defensible Architecture Cyber Supply Chain RiskManagement (C-SCRM) Incident Detection & Response Each priority area includes further alignment goals to address these variations. See below for more details on both of these events.
This is an area where government agencies can begin to explore the impact that AI and other tools can have in driving improved customer and employee experiences while thoughtfully balancing human interaction, automation, and riskmanagement. Certificates will be e-mailed to registrants.
To view this webinar: CDM Success Stories in an Age of Cyber-Attack Surface Expansion. Mr. Baidwan has more than 20 years of leadership experience in the field of cybersecurity riskmanagement, compliance, governance, network design, and Secure Agile application deployments in both the private and public sectors.
House of Representatives Committee on Government Operations (now Oversight and Reform), chaired by Jack Brooks (D-TX), where he supported the committee on IT oversight and legislative initiatives, such as the Procurement Integrity Act. More information on the webinars can be found below. SIZ-6281 (2024). [5] NAICS-6286 (2024).
The purpose of the RFI was to provide DoD with information to “support their efforts in developing policies, initiatives, and resource distribution to ensure support for the DIB in integrating AI into defense systems.” Interested parties can register for the GSA/DOE FY25 RFI informational webinar on August 22.
In addition, he will provide updates on the RiskManagement Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare.
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. To address notetaking, the department is seeking text-to-speech tools and solutions.
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. Webinar: What Contractors Need to Know about NIST SP 800-171 Cybersecurity, Nov.
The AISIC will develop guidelines for “red-teaming, capability evaluations, riskmanagement, safety and security, and watermarking synthetic content,” and will be housed within the U.S. Webinar – Healthcare Focus: Briefing on FY24 NDAA, Feb. AI Safety Institute. Comments are due to GSA by February 21.
Thursday, March 20, 2025 | 2:00PM EDT | 1 Hour | 1 CPE Within our energy agencies, the integration of AI, data, and cybersecurity is essential for advancing the technology modernization required for a stronger future. Participants will gain insights into effective approaches to riskmanagement and modernization methodologies.
Program Level: Beginner/Intermediate Delivery Method: Group Online Training * To receive a Training Certificate you must arrive on time and participate in the surveys throughout the webinar. Certificates will be e-mailed to registrants.
Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. Thursday, January 22, 2025 | 2:00PM EST | 90 Minutes | 1.5 Certificates will be e-mailed to registrants. Featured Speakers: James K.
Tune in on your favorite podcasting platform as we discuss key challenges including managing connectivity, applying compliance mandates, and ensuring effective cyber defenses, directly affecting federal health IT. To view this webinar: Boosting Data Security & Cyber Resilience in Federal Health IT. pharmaceutical supply chain.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He works to enable cyber and intelligence focused compute and store, collaboration, access control and identity management, data encryption and governance.
To view this webinar: CDM Success Stories in an Age of Cyber-Attack Surface Expansion. Mr. Baidwan has more than 20 years of leadership experience in the field of cybersecurity riskmanagement, compliance, governance, network design, and Secure Agile application deployments in both the private and public sectors.
Leadership Connect is organizing two webinars for government contractors about what agencies are focusing on right now. For Federal Information Systems using cloud computing services agencies will require Federal Risk and Authorization Management Program (FedRAMP) authorization at the level determined by the agency.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content