FEDcon22 is NARFE’s premier national conference for the federal community.
Acting Chair Cathy Harris and Board Members Tristan Leavitt and Raymond Limon discuss the Board’s approach to the backlog and plans for protecting whistleblowers.
How are agencies developing strategies to implement cutting edge software?
After applying a new zero trust control, measuring changes from current state via telemetry will indicate the success or failure of the control.
Conversations on Health Care hosts Mark Masselli and Margaret Flinter talk to Dr. Vega about these breakthroughs, how they help the entire health care sector and where the VA is partnering with Federally Qualified Health Centers.
What’s the difference between data and intelligence? After all, our world is saturated with data.
Key decisions to consider, including Social Security timing, rolling your TSP into an IRA, streamlining your financial life, and taking the appropriate amount of risk.
During this exclusive webinar, we will discuss how these agencies are refreshing their understanding of their own attack surfaces, their protective measures, vulnerabilities, and how far they are willing to go to ensure that their assets are secured from endpoint to cloud.
When it comes moving toward a zero trust architecture, the Department of Navy is still in the discovery phase. For six of the seven pillars of the Defense Department’s zero trust maturity model, the DoN…
The Defense Logistics Agency intends to move more applications to software as a service and has established a governance framework to help it answer critical questions, control costs and show impact of its cloud services.
The FY 2023 budget request placed a spotlight on collecting data on vulnerable communities in order to learn what Americans from every walk of life need to achieve full health.
MK Palmore, the director of the Office of the chief information security officer at Google Cloud, said agencies can increase their cyber visibility through a shared security model.
Roy Azevedo, the president of Raytheon Intelligence and Space, said DoD needs capabilities so that they can see before they're seen, and hear and before they're heard.
In the never-ending work of information technology modernization, federal agencies have been working on three tracks when it comes to cloud computing.
For a long time, cybersecurity has been treated as an afterthought by system engineers. But a revised National Institute of Standards and Technology publication says security should be an “emergent system property.” NIST senior fellow Ron Ross says engineering “trustworthy” systems will be increasingly important as the cyber and physical worlds converge.