Remove Leadership Remove Networking Remove White Paper
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.

article thumbnail

Generative AI in Government

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.

article thumbnail

Meeting the Requirements of a Mixed IT Environment

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.

IT 139
article thumbnail

Budgeting Priorities for Federal Deployment of Zero Trust (E130)

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. He has twice been awarded Jessie H.

Budget 134
article thumbnail

Breaking the System into Tiny Little Pieces: A DoD Approach to Zero Trust & Microsegmentation

FedInsider

An important tool in pursuing zero trust is to implement microsegmentation – partitioning a network into small, isolated sections to reduce the attack surface in each section, prevent lateral movement across networks, and lower risk. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.

article thumbnail

Applying Zero Trust Architecture in State & Local Government

FedInsider

Zero trust has been widely adopted for this purpose, coming to serve as a de-facto standard that enterprises, including government agencies, rely on to secure their users, apps, Internet of Things (IoT) devices, and workloads, regardless of which networks or cloud resources they’re connecting to, where they’re located, or how they’re connecting.

article thumbnail

Protecting APIs & Sensitive Data

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.

Data 119