This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Keep reading for a checklist to help you optimize procurement compliance and internal riskmanagement. Leadership support Like most things, procurement compliance starts at the top. While procurement can create the initial policies and procedures, leadership gets the final say. Get eProcurement with compliance built-in.
New Risk Center adds capabilities and integrations to extend existing leadership in enabling holistic management of supplier risk. ” riskmethods – A leader in supply chain riskmanagement, riskmethods empowers businesses to identify, assess and mitigate supply chain risk.
Featured Speakers: Martin Stanley × Martin Stanley AI & Cybersecurity Researcher Martin Stanley, AI and Cybersecurity Researcher, leads the NIST AI RiskManagement Framework (AI RMF) efforts at the U.S. Prior to his federal service Martin held executive leadership positions at Vonage and UUNET Technologies.
Modernizing the governmentwide compliance program for cloud services has been top of mind for Washington IT leaders in recent years, most notably with the passing of the FedRAMP Authorization Act in 2022 and the release of an Office of Management and Budget draft policy memorandum on overhauling program operations and governance in 2023.
He brings to V2X years long experience in leading cyber riskmanagement and defenses against advanced persistent threats. “At the forefront of cybersecurity leadership, my role as CISO is (Nasdaq: SAIC), was named chief information security officer at V2X, according to the executive’s LinkedIn announcement.
Companies deploying “critical-impact” AI would have to perform risk assessments consistent with NIST’s existing AI RiskManagement Framework, and these evaluations would then have to be submitted to the Commerce Department. The post Klobuchar and Thune introduce foundational AI legislation appeared first on FedScoop.
in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. He has also served as a Knowledge Manager at U.S. He has nearly 20 years of experience in the cybersecurity domain, with focuses on RiskManagement Framework and Software Assurance.
Additional goals called out in the memo include leading an information security program grounded in technical expertise and riskmanagement, increasing the marketplace rapidly through offering additional authorization paths, and leveraging shared infrastructure in public and private relationships.
Tim Potier’s most recent achievement was successfully elevating cybersecurity as a critical component of Parsons’ long-range strategic planning and overall enterprise riskmanagement strategy.
Stewart has over 20 years of experience executing customer-focused solutions in engineering, security governance, security measurement, and supply chain riskmanagement. “We We are excited to add Katie to our leadership team,” said J&J Worldwide Services CEO and President Steve Kelley. Now that [.]
CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5
That Shark Tank format, which the agency has noted it’s used previously, allows the FBI to educate its organization about its efforts to explore the technology in a “safe and secure way,” centralize use cases, and get outcomes it can explain to leadership.
He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. To view this webinar: Mobile Security: A Requirement for National Security. He has twice been awarded Jessie H.
The team should be diverse, with representatives that include IT leadership, department heads (for domain expertise), finance professionals, legal counsel, cybersecurity experts and end-users from relevant departments.”
Prior to joining ICE, Rob worked in leadership positions at several companies including Knowledge Consulting Group, Hewlett Packard (HP), and Electronic Data Systems (EDS). In addition, Rob works closely with mission partners in support of the use of new technologies such as artificial intelligence and secure communications.
Prior to joining August Schell, John served as DISA’s Cyber Security RiskManagement Executive and Chief Information Officer. Murphy previously provided cybersecurity and mission assurance serving as the Information System Owner and Program Manager for the Coast Guard’s Combat Management System. Army War College.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Central Command, U.S. Close CISO, U.S.
He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. These strategic initiatives include Secure the Defense Industry Base (DIB) and implementation of a Cyber Ready approach to RiskManagement. Central Command, U.S. Close CISO, U.S.
He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. He has spent more than 15 years in supervisory leadership roles across various cybersecurity functions. He has twice been awarded Jessie H. Department of Labor.
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. Prioritize as a key contract consideration the handling of data, including procedures for data management, accountability, and access. James Peake , M.D.,
As teams worked with suppliers through creative solutions, it became obvious that transparency and supplier riskmanagement are essential components to maintain stability during crises like these. The pandemic saw incredible growth in this area and highlighted opportunities for improvement within procurement processes and procedures.
Peter Bonner is a cross-sector innovator, working in the areas of human capital, workforce development, and leadership effectiveness. He is a Senior Fellow at the Federation of American Scientists, focused on improving federal talent management. Mr. Danforth joined Genasys Inc.
Distributing agencies’ application infrastructure and workloads among different clouds has benefits, such as greater resilience, targeted cost management, and greater flexibility in the future by avoiding lock-in with one provider.
Christy Wilder, Peraton Peraton has appointed Christy Wilder as chief security officer to lead the companys strategies for riskmanagement, incident response and enterprise safety. Peraton is emerging as a leading-edge technology company that continues to do exceptional work for its customers, Wilder said.
In this session, Manulife’s procurement leadership will share the lessons learned from past struggles with disjointed solutions, their vision for the future and how they delivered rapid savings while laying the groundwork for a consistent, comprehensive transformation of vendor riskmanagement, spend analysis, sourcing and contract management.
Jones brings valuable leadership, technical expertise, knowledge, and global experience to the position. With over 19 years of NSA experience in leadership and technical roles across several mission areas, Ms. Jones managed the oversight for IT investments and acquisition programs, ensuring the secure and keen use of IT across NSA.
Procurement has undergone a significant evolution, embracing responsibilities in margin protection, supply continuity, riskmanagement, sustainability, and innovation. Yet, despite. The post Redefining Procurement’s Value and Shifting Mindsets appeared first on Art of Procurement.
Federal Technology Office James is an executive with over 30 years of experience in aviation and cyberspace operations as well as riskmanagement in these areas. Close Lead Systems Engineer for Cybersecurity, Navel Information Warfare Center Atlantic James Imanian × James Imanian Senior Director, U.S.
In addition, he will provide updates on the RiskManagement Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare. These efforts play a pivotal role in ensuring that veterans receive the quality care and support they deserve.
Prior to INL, Rob spent 25 years at Fermi National Accelerator Laboratory (FNAL), America’s premier particle physics laboratory located outside of Chicago Illinois where he held the role of distinguished scientist and served in a number of scientific and laboratory leadership roles. Dr. Roser received his bachelor’s degree from the Univ.
He had taken on a few leadership roles in Flex such as Procurement Compliance Director, led the Global Sourcing team, and is currently member of Flex Supply Chain Council and Supply Chain RiskManagement. Daniel Koh is currently leading a team of 130 sourcing and pricing professionals globally.
According to a 2020 study by BCG, 70 percent of transformation projects fall short of expectations. This means that transformations. The post Participating in Procurement and Other Extreme Sports appeared first on Art of Procurement.
In 1907, J.P. Morgan was called back from a trip to help stop a series of bank runs on Wall. The post [Pod] JPMorgan Chase Stops the Financial Contagion appeared first on Art of Procurement.
Riskmanagement. Assessing, understanding, and managingrisk must become a core competency. Riskmanagement will evolve from having contingency plans to minimize risk with informative trade-off decisions and real-time decision making. appeared first on Directworks.
An overwhelming 84% of respondents indicated that their agency leadership considers understanding the impact of generative AI as a critical or important priority level for agency operations. Significantly, 71% believe that the potential advantages of employing generative AI in their agency’s operations outweigh the perceived risks.
In the 5th century BC, Socrates was teaching the Athenian people to think for themselves. He taught by asking questions: The post [Pod] The Power and Danger of Asking Good Questions appeared first on Art of Procurement.
The platform will deliver a range of benefits to JFC, including improved governance and auditability, more efficient procurement processes, more informed analysis and decision-making, proactive riskmanagement, improved supplier qualification and collaboration and better compliance with contracts and policies.
Bed Bath & Beyond was founded in New Jersey in 1971. Popular for its effective use of the ‘superstore’ concept, The post [Pod] Bed Bath & Beyond’s Decline from Superstore to No-more appeared first on Art of Procurement.
According to the EBA guidelines, outsourcing an activity shall never: Transfer bank’s senior management responsibility of running core management functions (e.g, risk strategy & oversight of business operations). Impair riskmanagement obligations. Third Party RiskManagement. fourth-party risk).
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. Prioritize as a key contract consideration the handling of data, including procedures for data management, accountability, and access. James Peake , M.D.,
Prior to joining August Schell, John served as DISA’s Cyber Security RiskManagement Executive and Chief Information Officer. Murphy previously provided cybersecurity and mission assurance serving as the Information System Owner and Program Manager for the Coast Guard’s Combat Management System. Army War College.
“Perhaps I shouldn’t say this in a public sphere, but within our class of multilateral development banks, my ideal is. The post [Pod] Setting the Standard for Procurement in Western Africa w/ Steve Ashcroft appeared first on Art of Procurement.
Originally published on RiskManagement Monitor. A better way of looking at those relationships is as partnerships—albeit ones that require management and alignment of objectives first and foremost, but ultimately mutually beneficial relationships. Secure executive buy-in from procurement, supply chain and IT leadership.
As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, riskmanagement, agency incident response plans, and programs. He is a recipient of the prestigious Fed 100 Award, recognizing his leadership at that agency. Immigration and Customs Enforcement.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content