This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
He also served as the Senior Executive Service as the Executive Director (XD) of the Office of Information and Technology (OIT) Enterprise Networks and Technology Support Directorate (ENTSD) at CBP, as well as serving concurrently in the role of Acting XD of the Border Enforcement and Management Systems Directorate. Air Force and U.S.
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.
When they buy technology, cities and counties will often face multiple issues, says Dean Cunningham , segment development manager, Public Safety at Axis Communications , a company that produces network cameras, access control systems, network audio devices and other IP networking solutions for physical security and video surveillance applications.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
Department of Energy’s Offices of the CFO A leadership expert once said , “Change is hard at first, messy in the middle and gorgeous at the end.” Modernization funding is almost always a concern, especially for longer-term projects. 6 Steps to Success But great rewards are possible with effective change management.
With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to projectmanagement to cybersecurity and data. He leads the Network Operations, Cybersecurity, and Outside Plant functions.
The spread of 5G was accelerated by the pandemic, as agencies and businesses alike had to transition to a work-from-home environment, requiring at-home workers to have the same network performance and access as they did in the office. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Ivalua Spend Management Insights [ivory-search] Get Ready for Success! ProjectManager (PM): The projectmanager oversees the implementation process, coordinating activities, managing timelines, and ensuring that project objectives are met.
He began his career as a network engineer and a systems administrator. He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and ProjectManagement Professional (PMP) certifications.
The first aid I learned as a teenager have also helped me with projectmanagement. On several occasions I had to practice first aid on my projects. Or teach my team to handle a project emergency while I was away. Bleeding out resources can also imperil projects. The same goes for the injured project.
With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to projectmanagement to cybersecurity and data. He leads the Network Operations, Cybersecurity, and Outside Plant functions.
To view this webinar: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust. Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & ProjectManager Alper Kerman is a security engineer and projectmanager at the National Cybersecurity Center of Excellence (NCCoE), NIST.
In that role, he oversees a program portfolio that includes Procurement Services, Business Service Center, and ProjectManagement Office. He was inducted into the New York IT Leadership Hall of Fame to recognize his contributions to New York State. Moses received a Ph.D., MA, and BA from the University at Albany.
During our recent virtual networking session, “New Year, New Goal: Setting Your 2023 Team Objectives,” Ray M. The end of the year is right around the corner, and goal setting for 2023 is top of mind for agencies and supervisors. Crawford, Jr. Chief Executive for Strategic Planning and Reporting, U.S.
I had completed several leadership programs and been promoted to high-visibility positions. I worked on high-impact company projects, and I worked with my management team to document a career path that took me all the way to corporate headquarters. But you can feel overwhelmed while wondering how to do it.
Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge , we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “ zero trust model.” Limiting our understanding to “the main and the plain” could lead to trouble.
Government Speakers: Skip Jentsch, Cloud ProjectsManager, General Services Administration Thomas Santucci, Director, Government-Wirde Policy (DCOI and CloudSmart), General Services Administration Monday, May 22 | 4-4:30 ET/1-1:30 p.m. Government Speaker: TBA Tuesday, May 23 | 2-2:45 p.m. ET/11-11:45 a.m.
With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to projectmanagement to cybersecurity and data. He leads the Network Operations, Cybersecurity, and Outside Plant functions.
His role in the department also involves collaborating with senior leadership to integrate information security with capital planning, enterprise architecture, and information collection initiatives. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE. He has twice been awarded Jessie H.
He began his career as a network engineer and a systems administrator. He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and ProjectManagement Professional (PMP) certifications.
New Executive Leadership for Enterprise Technology Solutions On February 16, 2023, Jake Marcellus became the Executive Director for Enterprise Technology Solutions (ETS). As of June 26, 2023, eight agencies have requested extensions to May 31, 2026. Some need additional weeks and some need additional months to complete their transition.
In that role, he oversees a program portfolio that includes Procurement Services, Business Service Center, and ProjectManagement Office. He was inducted into the New York IT Leadership Hall of Fame to recognize his contributions to New York State. Moses received a Ph.D., MA, and BA from the University at Albany.
Building trust and connections across networks takes time and energy. We have all these platforms — Teams and Zoom — that we use for talking about projects and due dates. For employees who live in places without good internet connection, Jammer suggested making hot spots available. Build Trust and Communication.
Featured Speakers: Jaime Fitzgibbon × Jaime Fitzgibbon AI/ML Program Manager Jaime Fitzgibbon is a Program Manager in the Defense Innovation Unit’s Artificial Intelligence and Machine Learning Portfolio and founder of Ren.ai.sance Insights, an AI-focused advisory network based in Vienna, VA.
Coaching is available to federal employees through the Federal Coaching Network, and some states, such as Virginia, offer individual and team coaching. “A Nefertiti DiCosmo, Supervisory Life Scientist for the Environmental Protection Agency, recommends enlisting a productivity coach.
Singh is passionate about process and projectmanagement. He has been in numerous leadership roles in the private sector for over 25 years, spanning accounting, finance, technology & operations management spheres. The critical thread across roles is Program, Process and ProjectManagement.
Co-selling with the AWS Partner Network on AWS Marketplace has helped Udemy drive five times the deals Udemy Business is an integrated learning solution that enables effective talent development across all functions, levels, and learning needs to help organizations increase employee engagement and achieve business goals.
Modisette has a bachelor’s degree in computer science and a master’s degree in information systems security management and a graduate certificate in projectmanagement. Federal Civilian teams at Palo Alto Networks through the creation and delivery of business-relevant security conversations to our key customers.
The Cybersecurity and Infrastructure Security Agency’s Continuous Diagnostics and Mitigation (CDM) program was first introduced in 2012 to provide a dynamic approach to strengthening government networks’ cybersecurity. Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc.
She is a catalyst for change, inspiring transformational leadership as a holistic wellness specialist and certified life coach, international best-selling author &motivational speaker, Dance director, and a mom of three. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
In a Harvard Business Review article , business leadership expert Denise Lee Yohn observed, “A company cannot expect to deliver a tech-enabled, seamless, and intuitive CX … if everything it does with employees is on paper, slow, and bureaucratic.” Every organization has internal systems or processes that frustrate employees.
They highlighted the need to establish a valid baseline for expected network behavior to identify deviations effectively, reducing false positives. framework and implemented zero trust solutions at the network level. Jeff has more than 25 years of experience conducting systems integration and defense in depth network security.
Under her leadership the Agency’s final DBE Rule was promulgated and implemented. In 2021, Kimberly was the recipient of the Presidential Rank Award for Meritorious Service, recognizing her career of leadership and service to EPA. Certificates will be e-mailed to registrants. As a member of the Senior Executive Service, Ms.
She is a catalyst for change, inspiring transformational leadership as a holistic wellness specialist and certified life coach, international best-selling author and motivational speaker, dance director, and a mom of three. She is passionate about empowering women to take charge of their lives and break through the glass ceiling.
We also explore the evolving role of AI and Machine learning in OT security, workforce development, and the ever-growing threats posed by interconnected IoT and OT networks. Tune in on your favorite podcast platform for expert insights on fortifying OT environments against emerging cyber threats.
in Organizational Leadership at Johns Hopkins University. DoD, he has been awarded the Annual Individual Award for Defending the DoDs Networks. He earned a Certificate from GWU in Executive Leadership and graduated from West Virginia University with Honors while earning multiple Engineering Degrees. pharmaceutical supply chain.
Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadershipprojects for government and private organizations. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.
He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadershipprojects for government and private organizations. During her time there, she held a number of leadership roles, including chief product officer. Certificates will be e-mailed to registrants.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content