Remove Leadership Remove Networking Remove Project Management
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.

article thumbnail

Cyber Attacks are Just as Damaging as Natural Disasters

FedInsider

He also served as the Senior Executive Service as the Executive Director (XD) of the Office of Information and Technology (OIT) Enterprise Networks and Technology Support Directorate (ENTSD) at CBP, as well as serving concurrently in the role of Acting XD of the Border Enforcement and Management Systems Directorate. Air Force and U.S.

article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.

article thumbnail

Governments need to plan for the entire product lifecycle when they purchase technology today

American City & Country

When they buy technology, cities and counties will often face multiple issues, says Dean Cunningham , segment development manager, Public Safety at Axis Communications , a company that produces network cameras, access control systems, network audio devices and other IP networking solutions for physical security and video surveillance applications.

article thumbnail

Knowing When, Where and How to Modernize

GovLoop

Department of Energy’s Offices of the CFO A leadership expert once said , “Change is hard at first, messy in the middle and gorgeous at the end.” Modernization funding is almost always a concern, especially for longer-term projects. 6 Steps to Success But great rewards are possible with effective change management.

article thumbnail

Identifying & Mitigating Election Security Threats in 2024

FedInsider

With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to project management to cybersecurity and data. He leads the Network Operations, Cybersecurity, and Outside Plant functions.

Media 83