John Breyault of the National Consumers League talks about ways you can protect your phones and computers from fraudsters and hackers.
Steven Touw, co-founder and CTO at Immuta, joins host John Gilroy on this week’s Federal Tech Talk to discuss precise controls for accessing high value data and the most cost effective way to accomplish this task.
What is the impact of IoT and federal security? Find out when Cameron Chehreh, chief operating officer, chief technology officer and vice president at Dell EMC Federal, joins host John Gilroy on this week’s Federal Tech Talk. Sept. 18, 2018
What are some of the biggest cybersecurity challenges facing IT workers in the federal government? Find out when Blue Ridge Networks CEO John Higginbotham joins host John Gilroy on this week’s Federal Tech Talk. August 7, 2018
Telos Corporation CEO John Wood joins host John Gilroy on this week’s Federal Tech Talk to discuss IT security and how his company can help federal agencies make a secure transition to the cloud. June 12, 2018
What is Instrumented Security and how can it help prevent cyber attacks at your federal agency? Find out when Earl Matthews, senior vice president and chief strategy officer at Verodin Inc., joins host John Gilroy on this week’s Federal Tech Talk. April 3, 2018
Texas Congressman Will Hurd, chairman of the Information Technology Subcommittee on Oversight and Government Reform, explains how his proposed Modernizing Government Technology Act could help solve the complex problem of IT in government. November 7, 2017
Tomas Okeefe and Chris Wiedemann, market research consultants at immixGroup, join host Mark Amtower on this week’s Amtower Off Center to federal tech spending during the rest of fiscal year 2017. May 8, 2017
Brian Fogg, vice president and chief technology officer, NCI Information Systems, will discuss how hyperconverged infrastructure or HCI, can help agencies reduce costs and improve security. September 6, 2016
Deborah Pierre-Louis, director of IT Security Policy, Liaison, and Training, Bureau of Information Resource Management, Department of State, discusses cybersecurity training, perimeter-based security, and security by design. June 14, 2016