Remove Magazine Remove Networking Remove Project Management
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. Close Moderator & Contributing Editor , FedInsider REGISTER The post Using Data to Fortify Network Defenses first appeared on FedInsider.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

First Aid for Projects

GovLoop

The first aid I learned as a teenager have also helped me with project management. On several occasions I had to practice first aid on my projects. Or teach my team to handle a project emergency while I was away. Bleeding out resources can also imperil projects. The same goes for the injured project.

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

Modisette has a bachelor’s degree in computer science and a master’s degree in information systems security management and a graduate certificate in project management. Federal Civilian teams at Palo Alto Networks through the creation and delivery of business-relevant security conversations to our key customers.

article thumbnail

Identifying & Mitigating Election Security Threats in 2024

FedInsider

With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to project management to cybersecurity and data. He leads the Network Operations, Cybersecurity, and Outside Plant functions.

Media 83
article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust (E140)

FedInsider

To view this webinar: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust. Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & Project Manager Alper Kerman is a security engineer and project manager at the National Cybersecurity Center of Excellence (NCCoE), NIST.

article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.