Yvette Bourcicot, the principal deputy assistant secretary of the Army for Manpower and Reserve Affairs, said with 500 occupations separated into 11 career fields, the service is reimagining how it attracts, retains and develops civilian employees.
When new mission needs arise, there are three questions to consider: Is there something I can co-opt from industry? Is this something I can collaborate on with industry? Who within industry could I co-invest with?Experts at Booz Allen Hamilton weigh in.
Endpoint management and security is becoming more automated. But it requires using the most current data about network activity.
Zero trust takes a multi-disciplinary team, full visibility into your network data, and a dash of artificial intelligence.
Dakota State University might be lesser known than other cybersecurity academic hubs, but it has a solid relationship with the national security community.
Join moderator Jason Miller, and agency and industry leaders as they discuss Agile, DevSecOps in the modernization of mission applications.
Zero trust architectures must cover both users and applications, and extend from the core network to the edge, all while giving all users an equal experience.
Join moderator Justin Doubleday, and agency and industry leaders to learn how agencies are implementing artificial intelligence and machine learning tools to enhance cybersecurity initiatives.
Join host Luke McCormack as he discusses 2023 federal IT successes with top government and industry technology experts.
Agencies with maritime missions increasingly rely on images and data from multiple sources, in and outside the government. In our new ebook, we share how that helps them establish clear situational context and develop useful analytics.
Consumer Financial Protection Bureau is concentrating on its people above its technology in its IT modernization and cybersecurity efforts.
Learn how agencies are utilizing data to drive mission success and keep pace with emerging technology.
Host Jason Miller and leaders from the Army and Cornerstone will discuss Army recruitment strategy, career management and the innovation workforce.
Technology for detecting and identifying molecular health hazards grows less expensive and more portable. The large data sets it generates requires investment in IT. The knowledge it throws off requires investments in people.
James Carnall, the head of cyber at Red River Technology, said that reaching a state of zero trust and enhancing cybersecurity generally will start with identity management.