Agencies have to figure out how to take a pragmatic approach to modernizing these legacy systems, to closing these security gaps and dramatically reduce risk while improving services to citizens.
Publicly available information is becoming increasingly important in the fields of intelligence analysis, cybersecurity and criminal investigations, among others.
In this exclusive executive briefing, cybersecurity professionals tackle the latest thinking in data analytic-driven and threat hunting, to better understand where the government is in cyber and what they see as the main challenges.
FEDtalk Tune in to FEDtalk this week for a discussion on Cybersecurity Awareness Month. A few weeks ago we heard from industry leaders about top cybersecurity concerns. This week, the individuals leading efforts to combat…
Whether it’s hurricanes on the east coast or wildfires and earthquakes out west, emergency disaster mitigation (EDM) tactics and strategies in the U.S. are being put to the test in a variety of ways.
In this interview, Mat Newfield goes in depth in the zero trust idea and what cyber people need to do to achieve a zero trust state.
This content is provided by the IBM Center for the Business of Government. Mondays at 11:00 a.m. & Fridays at 1:00 p.m. The Business of Government Radio Hour, hosted by Michael J. Keegan, features a…
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Buying a wireless charger for your smartphone. And we meet the hacker who defeated the infamous WannaCry ransomware.
In this exclusive executive briefing, IT security professionals address the federal approach to identity management and zero trust.
Agencies and private-sector companies invest considerable resources defending themselves against external cyber threats, but insider threats pose just as great a threat to these organizations if they don’t have a strategy in place to defend against them.
What is Military Design Thinking? How is Design being used to transforming military planning process? What is the Joint Special Operations University doing to educate special operations personnel in the use of design thinking? Michael Keegan explored these questions and more with Hal McNair, Director of Continuing Education at the Joint Special Operation University and faculty members Ben Zweibelson and Nate Schwagler.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. What to do when when your hard drive fails. And we meet the designer of the first computer-driven word processor.
There are an increasing amount of hoops contractors working in cyber need to jump through to partner with the government, but Tony Hubbard, government cybersecurity lead at KPMG, says that is the reality of the world today.
This content is sponsored by Melwood During National Disability Employment Awareness Month While workplace diversity is an issue on the minds of every HR professional in the DC region, in today’s tight labor market hiring for…
John DeSimone, the vice president for Cybersecurity and Special Missions at Raytheon, said agencies have to ask themselves, can their data—not just their systems—survive an attack?