Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Josh Moses, the former Office of Management and Budget’s chief of the cyber and national security branch in the office of Federal CIO, said agencies are in better shape to defend against cyber attacks because of a combination of policy, people and programs.
A sloppy cyber risk assessment can lead to misallocation of resources, false positives and an unrealistic sense of security at federal agencies, says Larry Clinton of the Internet Security Alliance.
Tom Sisti, vice president and chief legislative counsel at SAP joins host Roger Waldron on this week's Off the Shelf to discuss the state of commercial item contracting, category management, and the latest in cyber and supply chain risk policy developments. October 9, 2018
OMB released a cyber risk determination report finding that 74 percent of the agencies had cybersecurity programs that were either “at risk” or at “high risk.”
What are key acquisition policy highlights in the House version of the National Defense Authorization Act? Find out when Etherton and Associates President Jon Etherton and Tom Sisti, senior director and chief legislative counsel for SAP, join host Roger Waldron on this week's Off the Shelf. May 28, 2018
Thomas Jones, a federal systems engineer for Bay Dynamics, makes the case for agencies to define which assets are the most important to the mission.
Benjamin Bergersen, the chief information officer of the U.S. Trade and Development Agency, said the agency uses a combination of NIST documents, FedRAMP information and other data to understand and mitigate risk to their IT systems.
Terry Halvorsen left DoD at the end of February after spending the last two-plus years as its chief information officer.
A new partnership between Vencore and the George Mason University aims to develop a cyber risk assessment methodology and tool to help agencies and other organizations analyze the value of the data and determine how best to mitigate potential cyber threats.