Tune in to the July 6th FedTalk to hear about what’s in store for federal technology for the coming year, including developments on expanded use of artificial intelligence, extended reality, and the unveiling by the Department of Energy of Summit, the world’s most powerful supercomputer. July 6, 2018
Philip Quade, the chief information security officer for Fortinet, said because of the growing use of IoT devices, agency cyber executives and other leaders should pay more attention to the ever-growing integration between information technology (IT) and operational technology (OT).
In this exclusive executive briefing, federal and industry experts will delve deeper into how agencies can securely move from legacy systems to modern mobile computing.
Part of our executive survey series, the 2018 DoD data management survey dives into the state of data management in DoD today.
What is the U.S. Air Force doing to identify new technologies and promote innovation? How do advances in technology ease the path toward IT modernization? Join host Michael Keegan as he explores these questions with Frank Konieczny, Chief Technology Officer, U.S. Department of the Air Force.
Co-hosts Marc Isaacson and David Baer and their special guest Brenda Davis will discuss the benefits and challenges of a plant-based vegan diet.
The Defense Department has been making waves in the information technology industry with its single-award contract for the Joint Enterprise Defense Infrastructure Cloud Program (JEDI).
This program will provide a progress report on CDM and network security in government.
In modernizing the IT systems that support these and a myriad of other processes, agencies are trying to introduce a new a new level of automation that incorporates data analysis, improved business processes, and greater cybersecurity and privacy controls.
This program will provide a progress report on CDM and network security in government.
For cities to be deemed “smart,” the critical infrastructure sectors supporting these communities will leverage information and communication technology (ICT) to analyze real-time information.
The inescapable conclusion is that data loss and theft continue to increase for two primary reasons — insider actions and the ever-changing evil doer tactics to take advantage of that behavior.
Kevin Cox is the Program Manager for the Continuous Diagnostics and Mitigation (CDM) Program, within the Department of Homeland Security’s Office of Cybersecurity and Communications.
In this Expert Edition: Courageous HR, you'll learn from those at the peak of their performance, how they achieved victory in the Federal Employee Viewpoint Survey and landed at the top of the Partnership for Public Service's Best Places to Work list.
Cyberspace has been defined as a ‘fifth domain’ of warfare alongside sea, air, land, and space. Like our physical reality, cyberspace is coupled with survival pitfalls and we’re learning how to better identify, manage, mitigate, and respond to them as our knowledge and experience evolves.