This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Prior to joining August Schell, John served as DISA’s Cyber Security RiskManagement Executive and Chief Information Officer. Army War College.
To view this webinar: Mobile Security: A Requirement for National Security. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations. He has twice been awarded Jessie H.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations.
To view this webinar: DoD: Embracing Continuous Monitoring. in various leadership positions, including Large Extension Node Platoon Leader, Data Platoon Leader and corps and brigade staff officer. He has also served as a Knowledge Manager at U.S. serves as Director, G36 Cyber Defense and Network Operations, U.S.
Distributing agencies’ application infrastructure and workloads among different clouds has benefits, such as greater resilience, targeted cost management, and greater flexibility in the future by avoiding lock-in with one provider. Certificates will be e-mailed to registrants.
To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Prior to joining ICE, Rob worked in leadership positions at several companies including Knowledge Consulting Group, Hewlett Packard (HP), and Electronic Data Systems (EDS). Tune in on your favorite Podcasting Platforms.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Jones brings valuable leadership, technical expertise, knowledge, and global experience to the position. Certificates will be e-mailed to registrants.
To view this webinar: Talking Tech: Continuous Compliance for a Hybrid/Remote Workforce. He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. During his military career, he completed leadership assignments with the Joint Staff J4, U.S.
To view this webinar: Talking Tech: Continuous Compliance for a Hybrid/Remote Workforce. He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. During his military career, he completed leadership assignments with the Joint Staff J4, U.S.
To view this webinar: Who Are You – and Can You Prove It? Identity and Access Management. Federal Technology Office James is an executive with over 30 years of experience in aviation and cyberspace operations as well as riskmanagement in these areas.
To view this webinar: Bringing Agility to the Modern Security Operations Center. Under Roser’s leadership the experiment published ~450 refereed scientific papers. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Gilkeson has served in various leadership roles since he joined the TSA in 2013, first as a program manager and later as director of the agency’s Innovation Task Force (ITF).
To view this webinar: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust. Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & Project Manager Alper Kerman is a security engineer and project manager at the National Cybersecurity Center of Excellence (NCCoE), NIST.
To view this webinar: Be Prepared: The Cyber Wild West is Still Wild. She has led audits on government-wide cybersecurity, privacy, and information management issues, including reviews of the efficiency of federal privacy programs, the implementation of cybersecurity riskmanagement practices, and the transition to electronic records.
To view this webinar: How to Fight Threats to the Software Supply Chain. As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, riskmanagement, agency incident response plans, and programs. Immigration and Customs Enforcement. Department of Agriculture.
GSA Requesting Feedback on Draft Supply Chain RiskManagement Questionnaire The General Services Administration’s (GSA) Office of Information Technology Category has developed a supplier assurance questionnaire to gather information regarding cybersecurity supply chain riskmanagement (C-SCRM). This year, Sen.
Leadership from several GSA FAS categories will be in attendance to discuss their upcoming priorities, programs, and initiatives. This year’s event will feature VA leadership from the VA Federal Supply Schedules (FSS) program as well as the National Contract Service (NCS). James Peake , M.D., To register, click here.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Additionally, he has been a part of the IT Leadership Committee (ITLC), served as a Cybersecurity Chair, and been a member of the Digital Government Advisor Board.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations.
legacy technology and architecture, budget constraints) and ways to address them Complimentary Registration Accreditation: Participants can earn 1 CPE credit in Business Management & Organization.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar.
The Software Acquisition Guide for Government Enterprise Consumers was created by the Information and Communications Technology Supply Chain RiskManagement Task Force, a group co-led by CISA and industry representatives. Listen to the full podcast here.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Additionally, he has been a part of the IT Leadership Committee (ITLC), served as a Cybersecurity Chair, and been a member of the Digital Government Advisor Board.
The document, officially titled “Incident Response Recommendations and Considerations for Cybersecurity RiskManagement: A CSF 2.0 The new draft guidance also shifts the focus away from “detecting, analyzing, prioritizing, and handling incidents” to incorporating incident response into overall cybersecurity riskmanagement activities.
To view this webinar: CDM Success Stories in an Age of Cyber-Attack Surface Expansion. Mr. Baidwan has more than 20 years of leadership experience in the field of cybersecurity riskmanagement, compliance, governance, network design, and Secure Agile application deployments in both the private and public sectors.
The four areas in which agencies have made significant progress are: Managingrisks to safety and security; Bringing AI talent into government; Advancing responsible AI innovation; and Advancing U.S. leadership abroad. Reporting should begin by September 1, 2025.
Tom has also been selected to serve on several procurement panels and in leadership positions for multiple industry associations, including the Coalition. In response, the GSA leadership agreed with the OIG’s recommendations and is working on a corrective action plan. More information on the webinars can be found below.
In addition, he will provide updates on the RiskManagement Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare. These efforts play a pivotal role in ensuring that veterans receive the quality care and support they deserve.
AI leadership, including the creation of a task force focused on datacenter infrastructure. The priority areas are: Asset Management Vulnerability Management Defensible Architecture Cyber Supply Chain RiskManagement (C-SCRM) Incident Detection & Response Each priority area includes further alignment goals to address these variations.
The EO establishes new AI standards in eight categories: Safety and security; Privacy; Equity and civil rights; Supporting consumers and workers; Innovation and competition; American leadership; and Government use of AI. Webinar: What Contractors Need to Know about NIST SP 800-171 Cybersecurity, Nov.
November 15 Craig Hilliard , Division Chief, Medical/Surgical Prime Vendor (MSPV) Supplies, VHA Sarah Keefer , Branch Chief, Medical/Surgical Prime Vendor (MSPV) Supplies, VHA VA FSS: VA FSS leadership returns to address any questions related to the VA Schedules. Equal Employment Opportunity Reporting Season Begins Oct. This year, Sen.
To view this webinar: Bringing Automation to Cloud RiskManagement. Close Moderator & Contributing Editor , FedInsider The post Bringing Automation to Cloud RiskManagement (E189) first appeared on FedInsider. Ronzio started his career as an Information Technology Architect/Engineer.
Program Level: Beginner/Intermediate Delivery Method: Group Online Training * To receive a Training Certificate you must arrive on time and participate in the surveys throughout the webinar. Under her leadership the Agency’s final DBE Rule was promulgated and implemented. Certificates will be e-mailed to registrants.
Participants will gain insights into effective approaches to riskmanagement and modernization methodologies. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
CPE credit in Business Management & Organization.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
To view this webinar: Using Microsegmentation to Ease the Weight of Compliance. Prior to joining ICE, Rob worked in leadership positions at several companies including Knowledge Consulting Group, Hewlett Packard (HP), and Electronic Data Systems (EDS).
Tune in on your favorite podcasting platform as we discuss key challenges including managing connectivity, applying compliance mandates, and ensuring effective cyber defenses, directly affecting federal health IT. To view this webinar: Boosting Data Security & Cyber Resilience in Federal Health IT.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.
In March, the Office of Management and Budget released guidance on improving governance and managing the risks of AI. Additionally, he has been a part of the IT Leadership Committee (ITLC), served as a Cybersecurity Chair, and been a member of the Digital Government Advisor Board.
To view this webinar: CDM Success Stories in an Age of Cyber-Attack Surface Expansion. Mr. Baidwan has more than 20 years of leadership experience in the field of cybersecurity riskmanagement, compliance, governance, network design, and Secure Agile application deployments in both the private and public sectors.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations.
The full agenda explores the theme of “What is Fair and Reasonable,” with acquisition leadership from multiple agencies, including the VA, Defense Health Agency (DHA), and Defense Logistics Agency (DLA). Leadership Connect – Platinum Sponsor of the Fall Training Conference Don’t miss out! To register click here.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content