Remove Networking Remove Project Management Remove White Paper
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

Modisette has a bachelor’s degree in computer science and a master’s degree in information systems security management and a graduate certificate in project management. Federal Civilian teams at Palo Alto Networks through the creation and delivery of business-relevant security conversations to our key customers.

article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust (E140)

FedInsider

To view this webinar: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust. Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & Project Manager Alper Kerman is a security engineer and project manager at the National Cybersecurity Center of Excellence (NCCoE), NIST.

article thumbnail

Focus on Cyber Resiliency in a Hostile World (E171)

FedInsider

He began his career as a network engineer and a systems administrator. He is a Certified Information Systems Security Professional (CISSP) and holds the CISSP-Information Systems Security Engineering Professional (CISSP-ISSEP), Red Hat Certified Engineer (RHCE) and Project Management Professional (PMP) certifications.

article thumbnail

Using Security Intelligence to Protect Healthcare IT

FedInsider

She presents at conferences worldwide, holds several recognized IT, security, and project management certifications and has a Master of Science degree in Information Technology. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.

IT 52