Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
HHS is moving toward a zero trust architecture, collecting information on where it may be vulnerable and refining its approach.
How do AI, cloud computing and analytics fit into creating a successful zero trust strategy?
Gain the unique perspective on IT strategy from top government IT experts.
The national security community is stronger when users can take advantage of a connected foundation for secure innovation. But as classification levels for certain workloads increase, how can agencies ensure a seamless user experience while still protecting vital data and applications—and how should this work in an era of multicloud environments?
Learn from HR and technology leaders about how to transform human capital management
Host Bob Leins, CPA®, welcomes Bob Braunstein, Federal Benefits Specialist.
Rather than a six digit token, iProov solution generates colors that, when bounced from the screen off the user’s face and into the camera, positively identifies user as a living person, not a picture.
During this webinar, you will gain the unique perspective of top government security experts.
Start with your organization’s endpoints to secure users and data, recommends Cisco’s Peter Romness in a conversation with the Federal Drive’s Tom Temin. The same approach and tools can be applied to data on premise and in commercial clouds, he explains.
Yvette Bourcicot, the principal deputy assistant secretary of the Army for Manpower and Reserve Affairs, said with 500 occupations separated into 11 career fields, the service is reimagining how it attracts, retains and develops civilian employees.
When new mission needs arise, there are three questions to consider: Is there something I can co-opt from industry? Is this something I can collaborate on with industry? Who within industry could I co-invest with?Experts at Booz Allen Hamilton weigh in.
Endpoint management and security is becoming more automated. But it requires using the most current data about network activity.