This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Tune in on your favorite Podcasting Platforms.
Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. Army War College.
They address the critical cybersecurity challenges that riskmanagement requires, including alignment with zero trust architectures that agencies are mandated to implement. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He oversees riskmanagement and cybersecurity accountability for information systems, weapon systems and operational technology supporting military cyberspace operations.
To view this webinar: How to Fight Threats to the Software Supply Chain. As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, riskmanagement, agency incident response plans, and programs. Immigration and Customs Enforcement. Department of Defense.
PWC has been publishing the annual procurement survey since 2015, capturing many of the trends in procurement that we now see in organisations, such as the focus on supplier riskmanagement. There seems to be a drive within procurement teams to understand their suppliers and the network of suppliers under their tier one suppliers.
To view this webinar: Mobile Security: A Requirement for National Security. Tune in on your favorite podcasting platform as agency and industry experts share methods to protect mobile devices, secure applications, keep operating systems updated and train users not to fall prey to web-based attacks.
To view this webinar: DoD: Embracing Continuous Monitoring. serves as Director, G36 Cyber Defense and Network Operations, U.S. Close Director, Cyber Defense & Network Operations, U.S. He has nearly 20 years of experience in the cybersecurity domain, with focuses on RiskManagement Framework and Software Assurance.
Distributing agencies’ application infrastructure and workloads among different clouds has benefits, such as greater resilience, targeted cost management, and greater flexibility in the future by avoiding lock-in with one provider. Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Jones is responsible for all Agency IT systems and personnel, as well as the global communications network. Certificates will be e-mailed to registrants.
Quite a few of our customers are located in the Detroit area where we recently hosted a networking event featuring Nexteer Automotive. The audience was extremely engaged as many of them continue to look for better ways to generate the most value from the supplier selection process and ongoing supplier management.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
To view this webinar: Talking Tech: Continuous Compliance for a Hybrid/Remote Workforce. He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. Federated vs. centralized compliance. Defining “end points” in an As-A-Service world. Close CISO, U.S.
To view this webinar: Talking Tech: Continuous Compliance for a Hybrid/Remote Workforce. He reports directly to the DON Chief Information Officer (CIO) on the effectiveness of DON’s Cybersecurity RiskManagement Program. Federated vs. centralized compliance. Defining “end points” in an As-A-Service world. Close CISO, U.S.
To view this webinar: Bringing Agility to the Modern Security Operations Center. Prior to this role, Josh worked as a pre-sales systems engineer for Palo Alto Networks supporting combatant commands of the US Department of Defense, specifically focusing on US Central Command and US Special Operations Command.
To view this webinar: Who Are You – and Can You Prove It? Identity and Access Management. He began his career as a network engineer and a systems administrator. Federal Technology Office James is an executive with over 30 years of experience in aviation and cyberspace operations as well as riskmanagement in these areas.
To view this webinar: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust. Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & Project Manager Alper Kerman is a security engineer and project manager at the National Cybersecurity Center of Excellence (NCCoE), NIST.
.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
Quite a few of our customers are located in the Detroit area where we recently hosted a networking event featuring Nexteer Automotive. The audience was extremely engaged as many of them continue to look for better ways to generate the most value from the supplier selection process and ongoing supplier management.
To view this webinar: Be Prepared: The Cyber Wild West is Still Wild. She has led audits on government-wide cybersecurity, privacy, and information management issues, including reviews of the efficiency of federal privacy programs, the implementation of cybersecurity riskmanagement practices, and the transition to electronic records.
GSA Requesting Feedback on Draft Supply Chain RiskManagement Questionnaire The General Services Administration’s (GSA) Office of Information Technology Category has developed a supplier assurance questionnaire to gather information regarding cybersecurity supply chain riskmanagement (C-SCRM). VSBC-297-P (2023). [8]
This year’s tables include: November 20: GSA MAS PMO GSA Pricing Tools Medical/Surgical Supply BPAs SAM.gov PMO VA Federal Supply Schedule (FSS) November 21: VA FSS VA Prosthetics Community Care Network (CCN) View the agendas for more details. There will also be time to network with leadership of these contracting programs.
.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and riskmanagement processes governing use of AI, including a requirement that every agency appoint a Chief AI Officer (CAIO) before June 1. Certificates will be e-mailed to registrants.
.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. OpenAI released ChatGPT in November 2022, and yet it already has evolved so much that it bears little resemblance to v.0. Certificates will be e-mailed to registrants.
Network with peers from government and industry. CISA Releases Software Security Guide Federal News Network reports that the Cybersecurity and Infrastructure Security Agency (CISA) released a new guide on August 1 for Federal acquisition personnel that outlines how agencies can “better evaluate the security of the software they purchase.”
.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
Bill Introduced to Extend Skills-Based Hiring to Federal Contractors Federal News Network reports that Reps. The document, officially titled “Incident Response Recommendations and Considerations for Cybersecurity RiskManagement: A CSF 2.0 that was finalized in February 2024. Less than One Month Away!
GSA to Downsize Federal Office Space in Coming Years The General Service Administration (GSA) has plans to offload a sizable portion of Federal buildings that agencies no longer need, reports Federal News Network. GSA is currently working on a list of properties to sell or dispose of in fiscal year 2025. SAM dot What??
This is an area where government agencies can begin to explore the impact that AI and other tools can have in driving improved customer and employee experiences while thoughtfully balancing human interaction, automation, and riskmanagement. Certificates will be e-mailed to registrants.
The AISI will create evaluation tools, test AI models and safeguards, issue guidance on AI safety and riskmanagement, and conduct technical research. Manufacturing USA is a “national network of institutes that brings together people, ideas, and technology to solve advanced manufacturing challenges.” manufacturers.
GSA will host a webinar on July 22 at 1:00 PM (ET) to discuss the changes outlined in the Refresh. Webinar: CMMC Cybersecurity Requirements for Healthcare Contractors, July 31 The Coalition for Government Procurement and the AMSUS-SM Technology Working Group are co-hosting the following CMMC webinar on July 31 at 12pm ET.
To view this webinar: CDM Success Stories in an Age of Cyber-Attack Surface Expansion. Mr. Baidwan has more than 20 years of leadership experience in the field of cybersecurity riskmanagement, compliance, governance, network design, and Secure Agile application deployments in both the private and public sectors.
Network with peers from government and industry. DoD Exploring Portfolio-Based Acquisition Federal News Network reports that lawmakers are urging DoD to explore a portfolio-based acquisition approach that would allow the Department to invest in modern technologies more rapidly. More information on the webinars can be found below.
In addition, he will provide updates on the RiskManagement Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare. Because of your partnership, we can provide invaluable opportunities for learning, networking, and collaboration.
Meet with internal counsel beforehand- It is critical to engage with counsel to assure that your plans are sound and consistent with your obligations under the contract and the law Although it may feel like deja vu all over again, the prudent contractor will be prepared to mitigate performance and cost risk.
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. Webinar: What Contractors Need to Know about NIST SP 800-171 Cybersecurity, Nov.
NITAAC Looks to Extend CIO-SP3 by Additional Six Months Federal News Network reports that the National Institutes of Health IT Acquisition and Assessment Center (NITAAC) is seeking to extend the current expiration date of its CIO-SP3 contract vehicle by six months. Webinar – Healthcare Focus: Briefing on FY24 NDAA, Feb. percent ($14.2
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber Supply Chain RiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. Webinar: What Contractors Need to Know about NIST SP 800-171 Cybersecurity, Nov.
telecom providers; the attack began as much as two years ago and still infects the companies networks. These and many other incidents demonstrate the importance of IT riskmanagement, including automation of cybersecurity programs that can provide actionable insights and shift to proactive riskmanagement.
Participants will gain insights into effective approaches to riskmanagement and modernization methodologies. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content