This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Friday, October 13, 2023 | 2:00PM EDT | 1 Hour | 1 CPE In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. and its allies and partners.
Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. Certificates will be e-mailed to registrants.
In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Tune in on your favorite Podcasting Platforms.
Close Contributing Editor , FedInsider REGISTER The post Transforming Public Sector Leadership with Data-Driven Decisions first appeared on FedInsider. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes.
He also served as the Senior Executive Service as the Executive Director (XD) of the Office of Information and Technology (OIT) Enterprise Networks and Technology Support Directorate (ENTSD) at CBP, as well as serving concurrently in the role of Acting XD of the Border Enforcement and Management Systems Directorate. Air Force and U.S.
Jackson outlines her management priorities for NASA procurement while also sharing how her experiences over a 30-year career have shaped her approach to acquisition policy development. Finally, Jackson gives her thoughts on the keys to effective leadership. Learn more about your ad choices.
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.
Executive Mosaic has selected Steve Derr, vice president of Oracle‘s JWCC Program Management Office and cloud operations and engineering, as chairman of the Cloud Computing Group, part of its 4×24 program.
serves as Director, G36 Cyber Defense and Network Operations, U.S. in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. He has also served as a Knowledge Manager at U.S. Close Director, Cyber Defense & Network Operations, U.S.
He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.
As we celebrate, we find ourselves at the crossroads of progress and potential, confronting the myths holding women back from participating in public procurement and attaining certain heights in leadership. of suppliers of large value contracts have mostly women on their management teams. Happy International Women’s Day!
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization. Certificates will be e-mailed to registrants. Food and Drug Administration.
I want to take on a leadership role in the future. I like networking with my peers and hearing dynamic keynote speakers. Not sure if the upcoming NextGen Government Virtual Training Summit, “Supporting and Developing Gov Supervisors,” is right for you? Check all that apply: I’m an emerging leader that wants to be inspired.
Event Location Carahsoft Technology Corporation 11493 Sunset Hills Road Suite 100 Reston, VA 20190 Featured Speakers: Claudia Hosky × Claudia Hosky Publisher Claudia Hosky manages the company’s media property, FedInsider.com and sets the tone for its editorial and business focus.
For example, law firms often offer their associates pro bono representation opportunities, which can help one gain hands-on advocacy skills and client and case management skills while still early in their career. Opportunities for skills development may be available from many different sources.
Handling approximately 285,000 legal cases annually means that the Nebraska Judicial Branch manages hundreds of thousands of paper documents, audio and video files, and various forms of evidence every year. If you’re interested in learning more about this TTM, please speak to your AWS Partner Development Manager or contact AWS.
In this week’s episode of Feds at the Edge, we will dive into the unique challenges the federal government faces in identity management. Identity and Access Management. He began his career as a network engineer and a systems administrator. It’s been observed that if the identity solution is not convenient, it will be subverted.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the central role of Active Directory in managing identity, credentialing and access management, and what they consider best practices to protect its integrity.
For instance, 5G networks must have state-of-the-art security and encryption, since they will be targets of cyber attacks, espionage and data breaches. Allocating the radio spectrum requires careful, efficient management. There are challenges to incorporating 5G. Certificates will be e-mailed to registrants.
Featured Speakers: Kevin McCaney × Kevin McCaney Moderator & Contributing Editor Kevin McCaney is managing editor for Government Computer News, following mobile, cybersecurity and all things government IT. Certificates will be e-mailed to registrants. among others.
He has over 20 years of technology consulting experience in the areas of data visualization, geospatial analytics, data management, and data science. Kyle holds a master’s in technology management from George Mason University and a bachelor’s in management information systems from George Mason University.
He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.
In this episode of “Givers of GovCon,” we chat with Christine “Chrissy” Cocrane, vice president of management consulting at LMI, about her involvements on the Junior Achievement of Greater Washington Associate Leadership Council and the George C. Marshall Center Business Council.
In June of 2018, Pierson contacted the manager of the 737 program asking for a meeting and requesting that the factory be shut down for a period of time so that workers could get back on their feet. Since then, Pierson has continued to highlight safety concerns with 737 MAXs.
Employees’ home workstations may not always be connected to the organization’s network and users may be connected through a slow VPN, which presents unique challenges for maintaining a compliant environment. Certificates will be e-mailed to registrants.
Previously, she led IBM businesses in the Smarter Cities and Collaboration markets, as well as, spending 3 years working in Emerging Markets developing information management businesses in select countries. She earned her MBA from Northwestern University, Kellogg School of Management in 2002. Akiba is a Washington D.C.
And James Scobey, CISO for the SEC, notes the increase in data has led agencies to seek solutions like cloud technology, which allows for data management across various environments via APIs. He is a recipient of the prestigious Fed 100 Award, recognizing his leadership at that agency. Immigration and Customs Enforcement.
enterprise, non-terrestrial network and public sector customers. Greig joined the Druid team in 2022 after spending 28 years in the telecom space with leadership roles in IoT, connected vehicle, VoIP, MVNOs, and managed services; across organizations that include Aeris Communications, Arterra Mobility and Sprint.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
Close MacOS Security Configuration Architect, NASA Jet Propulsion Laboratory Jeff Eagle × Jeff Eagle Mac Program Manager Jeff Eagle is the Mac Program Manager for the U.S. Close Mac Program Manager, U.S. Certificates will be e-mailed to registrants. Citizenship & Immigration Services (USCIS).
Singh is passionate about process and project management. He has been in numerous leadership roles in the private sector for over 25 years, spanning accounting, finance, technology & operations management spheres. The critical thread across roles is Program, Process and Project Management. In addition to a B.S.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
The spread of 5G was accelerated by the pandemic, as agencies and businesses alike had to transition to a work-from-home environment, requiring at-home workers to have the same network performance and access as they did in the office. Certificates will be e-mailed to registrants.
government-funded news networks and international broadcasters. FedScoop obtained the new AI guidance as well as a letter of opposition — signed by dozens of journalists within the news organization — that was sent to VOA leadership in October and has not been made public until now.
Thursday, August 22, 2023 | 12:00PM – 5:00PM EDT | 3 CPE | Reston, VA 5G networks have become more common over the past few years. At the 5G Americas conference in October 2023, the keynote speaker said the U.S./Canada Canada region leads the world in 5G subscription penetration (41%), followed by China (33%), and Europe (just 13%).
The conversation also included Principi’s thoughts on leadership and management, often drawing on key experiences during his time in government. The post Healthcare and its impact on the VA’s mission first appeared on Federal News Network.
She provided enterprise-level research, design, analysis, performance optimization, standardization, service management, budgeting, and acquisition in support of a resilient Air Force (AF) critical infrastructure. While living in Scotland, he was a researcher working on power control systems for an offshore wind farm. cyber companies.
When they buy technology, cities and counties will often face multiple issues, says Dean Cunningham , segment development manager, Public Safety at Axis Communications , a company that produces network cameras, access control systems, network audio devices and other IP networking solutions for physical security and video surveillance applications.
He had an extensive career in the Federal Government, with leadership responsibilities leading to numerous national level roles at the Senior Executive Service level since April 2006. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.
One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously verified, regardless of the user’s location or device being used. Jennifer earned a master’s degree in information security policy and management from Carnegie Mellon University.
Key Takeaways Women-owned business certification enhances access to federal contracts, improves credibility, and facilitates valuable networking opportunities. Eligibility for certification requires that the business be at least 51% owned and managed by U.S. providing a wide network of support. Firms certified by the U.S.
While it speeds up processes and allows platforms to talk to each other, it’s vital that system administrators use Identity, Credential and Access Management, and know where the gaps are to provide endpoint protection. We will also address the double-edge sword of automation. He has held security, telecommunications and I.T.
At the federal level, the Office of Management and Budget (OMB) issued a memo in March providing guidance for agencies to establish AI governance and risk management techniques while implementing innovative uses for their own organizations, including steps to enable sharing and reuse of AI models, code, and data.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content