Remove Leadership Remove Networking Remove Risk Management
article thumbnail

Strengthening Your Network Security: Balancing Outer & Inner Defenses (E123)

FedInsider

In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Tune in on your favorite Podcasting Platforms.

Balance 104
article thumbnail

DoD Embracing Continuous Monitoring (E172)

FedInsider

serves as Director, G36 Cyber Defense and Network Operations, U.S. in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. He has also served as a Knowledge Manager at U.S. Close Director, Cyber Defense & Network Operations, U.S.

article thumbnail

Ivalua Launches Enhanced Third-Party Risk Management Capabilities

ivalua

New Risk Center adds capabilities and integrations to extend existing leadership in enabling holistic management of supplier risk. ” riskmethods – A leader in supply chain risk management, riskmethods empowers businesses to identify, assess and mitigate supply chain risk.

article thumbnail

Using Data to Fortify Network Defense (E151)

FedInsider

As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, risk management, agency incident response plans, and programs. He is a recipient of the prestigious Fed 100 Award, recognizing his leadership at that agency. Immigration and Customs Enforcement.

article thumbnail

Governments need to plan for the entire product lifecycle when they purchase technology today

American City & Country

When they buy technology, cities and counties will often face multiple issues, says Dean Cunningham , segment development manager, Public Safety at Axis Communications , a company that produces network cameras, access control systems, network audio devices and other IP networking solutions for physical security and video surveillance applications.

article thumbnail

Government Strategies & Investment for AI

FedInsider

CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. Army War College.