This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The Cybersecurity and Infrastructure Security Agency is looking for feedback on its “secure by design” whitepaper, which pushes software manufacturers to follow more stringent security principles in the design and development of all products shipped to customers. The deadline for comment submissions to CISA’s RFI is Feb. 20, 2024.
Against this backdrop, the new whitepaper, Checking the Boxes: Confidentiality and Data Protection in International Arbitration , edited by Kiran Nasir Gore and Joshua Karton , serves as a comprehensive guide for arbitration practitioners who are increasingly exposed to and handling large volumes of client data.
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization.
AI-powered security integrates with existing tools like Security Information and Event Management (SIEM) platforms, ticketing systems, and segmentation tools, ensuring alerts are backed by verifiable evidence. Vivian has invaluable experience in developing software, tools, and critical integrations for public sector operational use.
Thursday, May 9, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Infrastructure Integrity – Ensuring Resilient Systems Administering elections falls on the shoulders of state and territorial governments. It is not surprising, then, that there are so many different approaches, technologies, and processes in place to handle election infrastructure.
Thursday, March 21, 2024 | 2:00PM EDT | 1 Hour | 1 CPE AI Can Boost Election Integrity, if Done Correctly It has become clear over the past several years that maintaining U.S. election integrity is not just a single agency’s responsibility. He was integral to pushing for the restoration of a quorum at the EAC in 2015.
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
Define what elements of dam performance must be monitored, including dam integrity, water flow, sluice and causeway conditions, etc. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
Learning Objectives We’ll Discuss: Identify the current mechanisms in place to monitor dam safety and their limitations Delineate what elements of dam performance must be monitored, including dam integrity, water flow, sluice and causeway conditions, etc.
Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes.
The program has evolved over the past decade to add new capabilities, including cybersecurity tools, integration services, and dashboards that help participating agencies improve their security posture. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems.
What once was a quick way to integrate systems but minimally used, now has exploded onto federal networks by the thousands thanks to the popularity of cloud use. Did you know that 80% of attacks companies like Akamai Technologies are seeing involve API? What’s an API?
Taking this approach makes it possible to leverage native cloud APIs and services for seamless integration and enhanced performance. It requires attention to cloud security, but it can also streamline meeting regulatory requirements and maintain data integrity.
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Before joining the Department of Labor, Jason proudly served in the United States Air Force (USAF).
Learning Objectives We’ll Discuss: Identify the current mechanisms in place to monitor dam safety and their limitations Delineate what elements of dam performance must be monitored, including dam integrity, water flow, sluice and causeway conditions, etc.
And Dave Zukowski, Director of Defense Solutions for the Public Sector with Akamai Technologies warns of the risk factors, reminding everyone just because you can integrate systems, doesn’t mean you should. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
However, its findings are sufficiently worrying as to require a much more robust policy intervention that the proposals in the recently released WhitePaper ‘AI regulation: a pro-innovation approach’ ( for discussion, see here ). None of this features in the recently released WhitePaper ‘AI regulation: a pro-innovation approach’.
While many regulations governing federal contracts do not apply to OTAs (such as the Federal Acquisition Regulation (“FAR”) and the Competition in Contracting Act (“CICA”)), the Procurement Integrity Act does apply and as such, competitive practices are applicable to OTA solicitations. B-417379, Apr. 4, 2019, 2019 CPD ¶ 120 at 2.
Invoice-to-Pay is therefore an integral part of the whole procurement process, and typically includes the following tasks: Rather than the traditional silo’s of Invoice processing, budget allocation and payments, ensuring AP is not an isolated process but part of the whole procurement journey is important.
Swimming against the tide, and seeking to diverge from the EU’s regulatory agenda and the EU AI Act , the UK announced a light-touch ‘pro-innovation approach’ in its July 2022 AI regulation policy paper. The UK Government has launched a public consultation that will run until 21 June 2023.
With a career spanning over 28 years in the technology private and public sectors, and an expert Infrastructure Architect, she integrates proven cybersecurity and disaster recovery solutions tailored to the unique needs of local government.
The discussion will look ahead at the future of AI adoption, emphasizing strategic integration into mission outcomes, such as enhanced decision-making and improved operational efficiency. Artificial Intelligence Safety Institute , genAI, value creation, and system-wide transformation.
This requires understanding what tools are already available, their features and functionalities, how widely deployed they are, and how different tools can be integrated to achieve priorities such as adopting identity-driven access, incorporating the principle of least privilege, and reducing an agency’s threat surface.
His role in the department also involves collaborating with senior leadership to integrate information security with capital planning, enterprise architecture, and information collection initiatives. In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications.
This opportunity allows industry to submit whitepapers at any time that are aligned with one of the DPA’s areas of focus, including sustaining critical production, commercializing research and development investments, and scaling emerging technologies.
As part of this, in a February 2023 whitepaper released by Former Fed. In an August 19, 2022 whitepaper, Francesco Bianchi, Professor of Economics at Johns Hopkins, and Leonardo Melosi, Economist at the Federal Reserve Bank of Chicago, argued essentially that. [71] The experts are presently debating the prospect. [58]
Strengthening app security focuses on integrating security measures throughout the application lifecycle from development to deployment by using cloud-native technologies such as containers, microservices, and fixed infrastructure to protect against threats faced uniquely in the cloud while maintaining agility and scalability.
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization.
Close Enterprise Data Architect, United States Marine Corps Matt Sprung × Matt Sprung Team Lead, Infrastructure Analysis & Capacity Planning Infrastructure Operations Matt Sprung is the Team Lead for the Infrastructure Analysis and Capacity Planning Infrastructure Operations Division within the Integration Services Branch of USDA.
Thursday, March 20, 2025 | 2:00PM EDT | 1 Hour | 1 CPE Within our energy agencies, the integration of AI, data, and cybersecurity is essential for advancing the technology modernization required for a stronger future.
AI-powered security integrates with existing tools like Security Information and Event Management (SIEM) platforms, ticketing systems, and segmentation tools, ensuring alerts are backed by verifiable evidence. Vivian has invaluable experience in developing software, tools, and critical integrations for public sector operational use.
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
It is a challenging process; legacy technologies that never were designed to be integrated into the larger system, data silos, compliance requirements such as HIPAA, and cybersecurity risks all need to be addressed and modernized. Tuesday, April 29, 2025 | 2:00PM EDT | 1 Hour | 1 CPE Inserting new technology into the U.S.
As CIO, Jeff Shilling is responsible for the availability, confidentiality, and integrity of all NCI IT systems and their data. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
Hes authored multiple blogs and whitepapers, spoke at multiple industry forums, and was an initial member of the ACT/IAC Intelligent Automation Working Group. Mr. Prow is eminent in the market with a focus on applied performance improvement, automation and intelligence.
This week at Feds At the Edge, experts dive into the challenges of integrating AI in government work. For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
He also believes strongly in the power of automation and API’s and loves to talk about integrating Veeam with automation, security, reporting and compliance systems. Aaron believes passionately in data science and has championed applications that use data, machine learning and dashboards for competitive advantage.
Hes authored multiple blogs and whitepapers, spoke at multiple industry forums, and was an initial member of the ACT/IAC Intelligent Automation Working Group. Mr. Prow is eminent in the market with a focus on applied performance improvement, automation and intelligence.
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
For FedInsider, he has written many articles and whitepapers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content