Remove Integrity Remove Logistics Remove Magazine
article thumbnail

Cyber Resilience 2023 – Day Two: The Time to Act is Now!

FedInsider

With a career spanning over 28 years in the technology private and public sectors, and an expert Infrastructure Architect, she integrates proven cybersecurity and disaster recovery solutions tailored to the unique needs of local government.

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

This requires understanding what tools are already available, their features and functionalities, how widely deployed they are, and how different tools can be integrated to achieve priorities such as adopting identity-driven access, incorporating the principle of least privilege, and reducing an agency’s threat surface.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Identifying & Mitigating Election Security Threats in 2024

FedInsider

State and local governments are preparing for the election year by leveraging federal and private sector partners along with security tools to uphold election integrity. The author of numerous trade journal and online magazine articles, he is CISM (Certified Information Security Manager) and PMP (Project Management Professional) certified.

Media 83
article thumbnail

Identifying and Mitigating Election Security Threats in 2024

FedInsider

State and local governments are preparing for the election year by leveraging federal and private sector partners along with security tools to uphold election integrity. The author of numerous trade journal and online magazine articles, he is CISM (Certified Information Security Manager) and PMP (Project Management Professional) certified.

Media 40
article thumbnail

Bring the Power of AI to Cybersecurity

FedInsider

Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization.