Agencies have made their way down the zero trust path, but how are they working through the challenges? Jason Miller gets an industry perspective from Okta, CrowdStrike and Zscaler.
Agencies are reengineering their recruitment, hiring and retention strategies to find, nab and keep a broad spectrum of STEM-smart employees. Download this executive briefing to get a peek at efforts underway at DHA, HHS, Justice, NSF, Space Force, State and VA.
During this webinar, top government technology executives and industry experts will reflect on their 2022 accomplishments along with the people and technology that made these programs so successful.
The ability to quickly spin up a new app or access compute on demand are typical of the capabilities that make cloud’s OpEx cost model attractive. AWS and Commvault experts share tips on how to make the most of that model long term.
For today’s hybrid environments, with an impetus on achieving zero trust, agencies must apply new tactics to ensure security extends into and across cloud instances. The Federal Drive’s Tom Temin talks best practices with Akamai’s Patrick Sullivan.
You know what they say when people “assume.” Well, it’s best not so make assumptions about security provided by cloud service providers. We talk with experts from Dell and ThunderCat to learn best practices to keep your cloud instances safe.
What’s needed for agencies to improve their return on investment in cloud? We talk with Pluralsight’s Drew Firment to understand ways to democratize the requisite cloud literacy and knowledge that he says are critical to cloud success.
Ross Foard comes to his position at the Cybersecurity and Infrastructure Security Agency with experience. Lots of it. His long and storied federal career has landed him at CISA as an IT and information security specialist. “It’s probably,” he said, his “most rewarding” position to date.
If we agree that Health Care is a Right, Not a Privilege, how do we make that a reality?
Software supply chair risk management isn’t just for DoD and the Intelligence Community anymore. Get a primer on implementing SCRM from CISA’s Bob Costello, OMB’s Chris DeRusha and State’s Zetra Batiste.
As cloud services become enmeshed within the IT enterprise, tracking costs in near-real time and determining TCO become critical. In this Special Bulletin Review, we talk with officials at DLA, OPM, Accenture and Apptio about how to make this transformative leap.
The demand for technology expertise is fueling mergers and acquisitions, particularly among defense contractors. For The Business of Defense podcast, ASMC’s Rich Brady talks with Alta Via’s Dawn Sedgley about her company’s merger with cBEYONData.
Looking for a GWAC with built-in supply chain risk management? GSA’s 2nd Generation IT contract is the ticket. In this guide, we go deep to learn about 2GIT, how it incorporates SCRM and what’s on offer from its 75-plus vendors and FAS.
Looking for a GWAC with built-in supply chain risk management? GSA’s 2nd Generation IT contract is the ticket. In this guide, we go deep to learn about 2GIT, how it incorporates SCRM and what’s on offer from its 75-plus vendors and FAS.
Recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security. Find out more in this ebook