Sonny Bhagowalia, the deputy assistant commissioner and deputy chief information officer in the Office of Information and Technology at the U.S. Customs and Border Protection directorate in the Homeland Security Department, said the agency is addressing network and bandwidth challenges, first and foremost, and then securely connecting devices and data to agents through the cloud.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. What to do when Microsoft stops supporting your version of Windows. And we meet the man who invented an early walkie-talkie, Citizen’s Band radio, the telephone pager and the cordless telephone.
Dana Laake and her special guest Beth Greer will discuss how everyday toxins in your home impact your health.
Federal cybersecurity laws and regulations are continually changing to reflect today’s dynamic cyber threat environment. Federal employees and government contractors alike need to comply with these changes, else face serious consequences. Answer these 5 sample questions to see if your knowledge is up-to-date.
Cancer can put a strain on intimate relationships. Treatments for cancer and the disease itself may cause changes in sexual desire and function.
This program provides a progress report on emergency communications and public safety in government.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Buying a wireless charger for your phone. And meet a computer scientist who was instrumental in creating the design for today’s mobile phone.
Dana Laake and her special guest Dr. Paul O’Malley will discuss biomimetic dentistry including the science of rebuilding teeth safely without destroying them.
Craig Harber, the chief technology officer for Fidelis Cybersecurity, said there are several steps agencies can take to reduce their risks, starting by consolidating their security tools and architectures.
FireEye has an internal-facing insider threat program, where they fine-tune techniques for preventing insider threat breaches.
Like many large agencies, Justice officials want to use the disparate data sources to better analyze trends, improve internal operations and efficiency, and offer better services to Justice’s constituencies.
The United States has a long list of threats that it’s trying to get its arms around. But John Cotton, executive MBA adjunct faculty for the School of Business at George Mason University and retired Navy vice admiral, says there is one threat that outweighs all of them.
In this Expert Edition: Zero Trust – Privileged Access Management, you’ll hear from the people who are creating the culture, defining the philosophy and building the framework for the government writ large.
What are the IT strategic priorities for DHS? How is it working to modernize its IT infrastructure? What is DHS doing to improve its network connectivity and resilience while maturing its cybersecurity posture? I explored these questions and more with Dr. John Zangardi who joined me and my cohost Don Fenhagen, IBM, from the SPADE conference for an insightful and in-depth discussion.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. As tensions in relations. rise, the Iranians are increasing their hacking attacks on U.S. targets. And we meet the mathematician and entrepreneur who co-founded Akamai Technologies.