This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Tune in on your favorite Podcasting Platforms.
serves as Director, G36 Cyber Defense and Network Operations, U.S. in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. He has also served as a Knowledge Manager at U.S. Close Director, Cyber Defense & Network Operations, U.S.
New Risk Center adds capabilities and integrations to extend existing leadership in enabling holistic management of supplier risk. ” riskmethods – A leader in supply chain riskmanagement, riskmethods empowers businesses to identify, assess and mitigate supply chain risk.
As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, riskmanagement, agency incident response plans, and programs. He is a recipient of the prestigious Fed 100 Award, recognizing his leadership at that agency. Immigration and Customs Enforcement.
When they buy technology, cities and counties will often face multiple issues, says Dean Cunningham , segment development manager, Public Safety at Axis Communications , a company that produces network cameras, access control systems, network audio devices and other IP networking solutions for physical security and video surveillance applications.
CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. Army War College.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Central Command, U.S. Close CISO, U.S.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Central Command, U.S. Close CISO, U.S.
Distributing agencies’ application infrastructure and workloads among different clouds has benefits, such as greater resilience, targeted cost management, and greater flexibility in the future by avoiding lock-in with one provider. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Jones is responsible for all Agency IT systems and personnel, as well as the global communications network. Jones brings valuable leadership, technical expertise, knowledge, and global experience to the position. With over 19 years of NSA experience in leadership and technical roles across several mission areas, Ms.
Prior to INL, Rob spent 25 years at Fermi National Accelerator Laboratory (FNAL), America’s premier particle physics laboratory located outside of Chicago Illinois where he held the role of distinguished scientist and served in a number of scientific and laboratory leadership roles. Dr. Roser received his bachelor’s degree from the Univ.
He began his career as a network engineer and a systems administrator. He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and Project Management Professional (PMP) certifications.
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. Prioritize as a key contract consideration the handling of data, including procedures for data management, accountability, and access. James Peake , M.D.,
The latest bid, which followed at least two previous failures, is facing similar troubles as earlier projects: incomplete planning, a technology platform with questionable maturity and, maybe most striking, the hubris of the leadership that their current plan will be successful no matter what evidence emerges that tells a different story.
In addition, he will provide updates on the RiskManagement Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare. These efforts play a pivotal role in ensuring that veterans receive the quality care and support they deserve.
Prior to joining August Schell, John served as DISA’s Cyber Security RiskManagement Executive and Chief Information Officer. In this role, John was responsible for managingrisk in the cyber domain and ensuring security throughout DISA and the Department of Defense Information Network (DoDIN). Army War College.
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. James Peake , M.D., ASPR reports that in 2023, healthcare organizations saw a 128 percent increase in ransomware attacks. For more information about the NCODE program, visit www.army.mil/dasades#org-work-with-us.
She has led audits on government-wide cybersecurity, privacy, and information management issues, including reviews of the efficiency of federal privacy programs, the implementation of cybersecurity riskmanagement practices, and the transition to electronic records.
Capture additional supplier details through forms/assessments/surveys to drive more complete information as well as improved compliance, riskmanagement and communication. Provide an enterprise view of clear, comprehensive and accurate supplier information. Source: 2019 Supply Chain Data Quality and Governance Study.
Featured Speakers: Jaime Fitzgibbon × Jaime Fitzgibbon AI/ML Program Manager Jaime Fitzgibbon is a Program Manager in the Defense Innovation Unit’s Artificial Intelligence and Machine Learning Portfolio and founder of Ren.ai.sance Insights, an AI-focused advisory network based in Vienna, VA.
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. This year’s event will feature VA leadership from the VA Federal Supply Schedules (FSS) program as well as the National Contract Service (NCS). James Peake , M.D.,
As CMO at Ivalua, Alex leads overall marketing strategy and thought leadership programs. Alex also spent 12 years at Ariba, first building and running the spend analytics business as General Manager. Earlier, Alex was a founding member of Zeborg (acquired by Emptoris)where he developed vertical Procurement applications.
GSA Requesting Feedback on Draft Supply Chain RiskManagement Questionnaire The General Services Administration’s (GSA) Office of Information Technology Category has developed a supplier assurance questionnaire to gather information regarding cybersecurity supply chain riskmanagement (C-SCRM). This year, Sen.
He also outlined the road map for the next two years, and it’s clear Ivalua is seeking to be right up there at the leading edge of capability across the whole platform, from riskmanagement to advanced sourcing options. The Future of Procurement” is not a wholly original title, but the next session from Natacha Tréhan was excellent.
Additionally, he has been a part of the IT Leadership Committee (ITLC), served as a Cybersecurity Chair, and been a member of the Digital Government Advisor Board. He has over 25 years of industry experience in IT networking, cyber security, and data center design and implementation. Public Sector West for Fortinet.
Additionally, Mark helps clients understand where to start with zero trust and how to utilize security program management and security riskmanagement to ensure continued success in the implementation of Zero Trust concepts. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. OpenAI released ChatGPT in November 2022, and yet it already has evolved so much that it bears little resemblance to v.0. He has twice been awarded Jessie H.
Additionally, he has been a part of the IT Leadership Committee (ITLC), served as a Cybersecurity Chair, and been a member of the Digital Government Advisor Board. He has over 25 years of industry experience in IT networking, cyber security, and data center design and implementation. Public Sector West for Fortinet.
Mr. Baidwan has more than 20 years of leadership experience in the field of cybersecurity riskmanagement, compliance, governance, network design, and Secure Agile application deployments in both the private and public sectors.
Network with peers from government and industry. CISA Releases Software Security Guide Federal News Network reports that the Cybersecurity and Infrastructure Security Agency (CISA) released a new guide on August 1 for Federal acquisition personnel that outlines how agencies can “better evaluate the security of the software they purchase.”
Bill Introduced to Extend Skills-Based Hiring to Federal Contractors Federal News Network reports that Reps. The document, officially titled “Incident Response Recommendations and Considerations for Cybersecurity RiskManagement: A CSF 2.0 that was finalized in February 2024. Less than One Month Away!
The four areas in which agencies have made significant progress are: Managingrisks to safety and security; Bringing AI talent into government; Advancing responsible AI innovation; and Advancing U.S. leadership abroad. GSA is currently working on a list of properties to sell or dispose of in fiscal year 2025. SAM dot What??
Tom has also been selected to serve on several procurement panels and in leadership positions for multiple industry associations, including the Coalition. Network with peers from government and industry. In response, the GSA leadership agreed with the OIG’s recommendations and is working on a corrective action plan.
In addition, he will provide updates on the RiskManagement Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare. These efforts play a pivotal role in ensuring that veterans receive the quality care and support they deserve.
Meet with internal counsel beforehand- It is critical to engage with counsel to assure that your plans are sound and consistent with your obligations under the contract and the law Although it may feel like deja vu all over again, the prudent contractor will be prepared to mitigate performance and cost risk. James Peake , M.D.,
Related to the protection of privacy, the National Science Foundation will promote research, development and implementation of privacy-enhancing technologies (PETS), including by creating a research coordination network dedicated to advancing privacy research and working with federal agencies to identify opportunities to incorporate PETS (e.g.
Peter Bonner is a cross-sector innovator, working in the areas of human capital, workforce development, and leadership effectiveness. He is a Senior Fellow at the Federation of American Scientists, focused on improving federal talent management. Mr. Danforth joined Genasys Inc.
These include: Ensure safe and secure AI technology; Promote responsible innovation, competition, and collaboration; Support American workers; Advance equity and civil rights; Protect American consumers, patients, passengers, and students; Protect privacy and civil liberties; Manage the federal government’s use of AI; and Strengthen U.S.
The EO establishes new AI standards in eight categories: Safety and security; Privacy; Equity and civil rights; Supporting consumers and workers; Innovation and competition; American leadership; and Government use of AI. The EO tasks at least seven agencies with the implementation, enforcement, and analysis of the new standards.
November 15 Craig Hilliard , Division Chief, Medical/Surgical Prime Vendor (MSPV) Supplies, VHA Sarah Keefer , Branch Chief, Medical/Surgical Prime Vendor (MSPV) Supplies, VHA VA FSS: VA FSS leadership returns to address any questions related to the VA Schedules. Equal Employment Opportunity Reporting Season Begins Oct. This year, Sen.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content