Remove Magazine Remove Networking Remove Project Management
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. Close Moderator & Contributing Editor , FedInsider REGISTER The post Using Data to Fortify Network Defenses first appeared on FedInsider.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust (E140)

FedInsider

To view this webinar: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust. Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & Project Manager Alper Kerman is a security engineer and project manager at the National Cybersecurity Center of Excellence (NCCoE), NIST.

article thumbnail

Protecting the 2024 Election: Be Prepared for Anything

FedInsider

With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to project management to cybersecurity and data. He leads the Network Operations, Cybersecurity, and Outside Plant functions.

article thumbnail

Focus on Cyber Resiliency in a Hostile World (E171)

FedInsider

He began his career as a network engineer and a systems administrator. He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and Project Management Professional (PMP) certifications.

article thumbnail

Zero Trust Needed to Win the Cyber War (E157)

FedInsider

Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge , we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “ zero trust model.” Limiting our understanding to “the main and the plain” could lead to trouble.