Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Dean Hullings, the global defense solutions strategist for Forescout Technologies, said the goals of the comply-to-connect program was to close the gaps of existing security tools and make existing security processes more efficient for network administrators.
This panel explores the range of data practices and strategies needed for today’s policy and compliance environment.
About RSA RSA, a leader in cybersecurity and risk management solutions, provides organizations with technology to address challenges across security, risk management and fraud prevention in the digital era. RSA solutions are designed to…
Amy Button, the vice president of aerospace, defense and government system integrators at Salesforce, said while every business is on a digital transformation journey, many aerospace and defense companies must figure out which technologies can enhance productivity and efficiency, which will help them recover from the economic loss due to the pandemic.
Jason Corey, the senior director for emerging technologies at Red Hat, said the pandemic has brought a sense of urgency to agency digital transformation efforts like few other events have done before.
Chris Townsend, the area vice president for federal sales at UiPath, said this unprecedented growth and acceptance of automation comes from the desire for agencies to have employees no longer focus on menial or “low-value” work and spend more time on mission activities.
For strategy insight into this new normal, a panel of federal practitioners convened to discuss them.
Srinivas Kosaraju, the senior director of public sector at Tableau, said data can provide the information, the transparency and the trust that many citizens are looking for these days.
Dennis Reilly, the vice president of public sector at Gigamon, said agencies can use the pandemic emergency to continue to make progress.
Dan Woods, the vice president of the Shape Intelligence Center with Shape Security, which is now part of F5 Networks, said a credential stuffing attack isn’t about breaking into someone’s account, but rather verifying the credential itself.
Henry Sowell, the chief information officer at Cloudera Government Solutions, said agencies are struggling to manage and deal with the volume and velocity of data coming their way.
Dave York, the senior vice president of U.S. public sector for Genesys, said agencies can use RPA, AI and intelligent automation to continue and accelerate their digital transformations and improve citizen services.
JIT PAM can ensure that identities only have the appropriate privileges when necessary, and for the least time necessary.
The use of DevOps or agile development has grown by leaps and bounds over the last few years.