Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
As agencies move beyond artificial intelligence and machine learning pilots, we find out what it takes to be successful. We talk with experts from the Army, CISA, DoD, GSA, NGA, NRO, NTIS, OSTP and from ABBYY, DataRobot, H2O, MarkLogic and Red Hat.
Cyber leaders at Customs and Border Protection, Education, FDIC and USCIS along with experts from Crowdstrike, Okta and Zscaler share their thinking on how to layer in security for zero trust while also minimizing friction on users.
Looking for a GWAC with built-in supply chain risk management? GSA’s 2nd Generation IT contract is the ticket. In this guide, we go deep to learn about 2GIT, how it incorporates SCRM and what’s on offer from its 75-plus vendors and FAS.
Looking for a GWAC with built-in supply chain risk management? GSA’s 2nd Generation IT contract is the ticket. In this guide, we go deep to learn about 2GIT, how it incorporates SCRM and what’s on offer from its 75-plus vendors and FAS.
Bill Rowan, the vice president of public sector at Splunk, said agencies must move toward using real-time data to understand their technology environments and make changes to address security and citizens’ needs.
In this exclusive ebook, we share pointers on establishing DevSecOps from the Army, GSA, NGA, the National Museum of African American History and Culture, OMB, VA and industry experts from Atlassian, Datadog, Invicti Security, Red Hat and Second Front Systems.
Granting access to, sharing and securing data in the cloud continues to challenge agencies across government. During this exclusive webinar, moderator Jason Miller will discuss cloud strategy, security and applications with agency and industry leaders.
Agencies need to consider how best to use tools like continuous monitoring and how to integrate threat intelligence into their protections. All of these efforts are important to agencies as they digitally transform their services and processes and move more workloads to the cloud.
Agencies across the government are intently focused on cyber initiatives, driven in part by evolving threats and in part by the directives of the White House’s executive order on improving cybersecurity. But how can these lessons be applied to your cyber evolution efforts? Download this exclusive ebook to learn more.
Federal IT compliance is only enforced through self-reporting, so tracking action taken on security guidance is hard. Here’s why independent third-party capability is needed to monitor, track and verify compliance across the federal government.
Data is the connective tissue across all agency mission areas. No matter if you are serving citizens at the Social Security Administration or the IRS, or defending the homeland at the departments of Defense or Homeland Security, data will drive decisions. The challenge, of course, is data is always moving and changing.
Across the government, in agencies large and small, IT leaders have launched efforts to use to multi-domain cloud environments to deliver against mission demands. We talk to experts inside and outside government to uncover takeaways in this exclusive ebook.
Can artificial intelligence help agencies stay ahead of cyberthreats, especially as attackers get cleverer and potential attack vectors increase? BlackBerry CTO Charles Egan shares insights on why and how AI tools can help.
If an agency buy software through a reseller on a GSA Schedule contract, does the software vendor have a claim if the agency cancels the license?