This week hosts Mark Masselli and Margaret Flinter speak with Dr. Michael Mina, Epidemiologist and member of the Center for Communicable Disease Dynamics at Harvard where they are taking a multi-disciplinary approach to tackling the ongoing pandemic. Dr. Mina has long been a proponent of making cheap, rapid, at-home COVID tests available to all Americans as a much more effective way to curtail the pandemic’s spread. He says these tests which have been deployed successfully in other countries, are almost 100 per cent effective in identifying potential infectious ‘super-spreaders’, and that government should classify them as a public health, not a medical, tool to allow for more swift production and deployment. He also discusses their efforts to build a global surveillance system for future disease outbreaks.
Hosted by Dr. Richard Shurtz and Andrew Mitchell. Sponsored by Stratford University. Find out if your Windows 11 is as secure as it can be. And we meet the founder of the Taiwanese company that makes 90% of the world’s most advanced semiconductor chips.
Eric McGrane, a growth leader for the defense enterprise services sector at GDIT, which manages the platform, said SaaS is one of several innovations that milCloud 2.0 is offering.
During this webinar, top government security experts from the Cybersecurity Infrastructure Security Agency, Department of Veterans Affairs and Office of the Comptroller of the Currency provide a CDM status update and look towards the future.
Hosted by Dr. Richard Shurtz and Andrew Mitchell. Sponsored by Stratford University. How to scan for a hidden camera in your hotel room or vacation rental. And we get the real story behind a man with a fake name.
In this exclusive executive briefing, agency and industry executives explore why protecting data requires a comprehensive approach involving every part of the IT chain – people, policy, infrastructure and applications.
This exclusive e-book highlights what a few federal agencies are doing to tackle data security challenges and improve their cyber data posture.
During this webinar James Woolsey, the president of the Defense Acquisition University, Frank Kelley, the vice president of the Defense Acquisition University and Michelle Currier, the professor of contract management at the Defense Acquisition University, will discuss the future of DoD contracting, pricing and acquisition. In addition, Michael Weaver, the professor of contract management at Propricer will provide an industry perspective.
Bill Rowan, the vice president for strategic alliances for government, education and healthcare at VMware and Keith Nakasone, a federal strategist at VMware discuss how agencies can benefit from a cloud management platform to manage workloads, data and security risks. Rowan said having such a tool means agencies can ensure consistency across their workloads without losing any of the speed, control and agility.
Large agencies have a harder time moving ahead on that inventory, but smaller agencies like the Federal Energy Regulatory Commission are getting started by focusing on building out the data community, and making sure it has data stewards up maintain data quality.
During this webinar, you will learn how top government healthcare IT executives from the Office of the National Coordinator for Health IT, Department of Veterans Affairs, Defense Health Agency and the Federal Electronic Health Record Modernization are delivering healthcare IT services.
Hosted by Dr. Richard Shurtz and Andrew Mitchell. Sponsored by Stratford University. Why it’s not weird to like your own Facebook posts. And we profile the “Mark Zuckerberg of Russia.”
This discussion with Tom Moore, the chief cloud architect and engineer for the federal civilian division at GDIT, is part of Federal News Network’s Cloud Exchange.
Click View Session on the back of each card to see the full video and read more about each presenter. Day 1 Day 2 Day 3 Sponsored Content
About a third of all cyber incidents federal agencies faced last year were unknown or outside the typical spam, phishing or web authentication vectors. The Office of Management and Budget says the prevalence of this attack vector suggests additional steps should be taken to ensure agencies appropriately categorize the vector of incidents during reporting.