This content is provided by the IBM Center for the Business of Government. Mondays at 11:00 a.m. & Fridays at 1:00 p.m. The Business of Government Radio Hour, hosted by Michael J. Keegan, features a…
Dana Laake and her special guest Todd White will discuss natural wine vs commercially processed wine. Todd White is the founder of Dry Farm Wines – a purveyor of healthy, organic and natural wines. He…
Publicly available information is becoming increasingly important in the fields of intelligence analysis, cybersecurity and criminal investigations, among others.
In this exclusive executive briefing, cybersecurity professionals tackle the latest thinking in data analytic-driven and threat hunting, to better understand where the government is in cyber and what they see as the main challenges.
Whether it’s hurricanes on the east coast or wildfires and earthquakes out west, emergency disaster mitigation (EDM) tactics and strategies in the U.S. are being put to the test in a variety of ways.
This content is provided by the IBM Center for the Business of Government. Mondays at 11:00 a.m. & Fridays at 1:00 p.m. The Business of Government Radio Hour, hosted by Michael J. Keegan, features a…
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Buying a wireless charger for your smartphone. And we meet the hacker who defeated the infamous WannaCry ransomware.
In this exclusive executive briefing, IT security professionals address the federal approach to identity management and zero trust.
What is Military Design Thinking? How is Design being used to transforming military planning process? What is the Joint Special Operations University doing to educate special operations personnel in the use of design thinking? Michael Keegan explored these questions and more with Hal McNair, Director of Continuing Education at the Joint Special Operation University and faculty members Ben Zweibelson and Nate Schwagler.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. What to do when when your hard drive fails. And we meet the designer of the first computer-driven word processor.
There are an increasing amount of hoops contractors working in cyber need to jump through to partner with the government, but Tony Hubbard, government cybersecurity lead at KPMG, says that is the reality of the world today.
This content is sponsored by Melwood During National Disability Employment Awareness Month While workplace diversity is an issue on the minds of every HR professional in the DC region, in today’s tight labor market hiring for…
John DeSimone, the vice president for Cybersecurity and Special Missions at Raytheon, said agencies have to ask themselves, can their data—not just their systems—survive an attack?
Dan Fallon, the senior director of federal engineering for Nutanix, said the way to close many cybersecurity gaps is to adopt the concept of inherent security or secure by original design.
In this exclusive executive briefing, IT specialists discuss how federal agencies are approaching cloud computing.