Remove Leadership Remove Networking Remove White Paper
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.

article thumbnail

Generative AI in Government

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Meeting the Requirements of a Mixed IT Environment

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.

IT 139
article thumbnail

Budgeting Priorities for Federal Deployment of Zero Trust (E130)

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. He has twice been awarded Jessie H.

Budget 134
article thumbnail

Breaking the System into Tiny Little Pieces: A DoD Approach to Zero Trust & Microsegmentation

FedInsider

An important tool in pursuing zero trust is to implement microsegmentation – partitioning a network into small, isolated sections to reduce the attack surface in each section, prevent lateral movement across networks, and lower risk. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.

article thumbnail

After an Attack: Cyber Recovery Best Practices for State & Local Agencies

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.

article thumbnail

Metrics that Matter for Critical Infrastructure Cyber Resilience

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.