Subscribe

Big Data & Analytics
The purpose of this workshop is to provide senior-level executives with a framework and set of actionable steps to understand and assess the data maturity of their organization. By leveraging the Federal Government Data Maturity Model (FGDMM), attendees will engage in "hands-on" exercises to articulate a data strategy and roadmap for their agency. At this workshop, you will hear from a number of industry leaders as they share their experiences with Data Strategy and Management, including:
Cybersecurity
“Hope for the best, plan for the worst”. This ancient principle still applies, especially for systems with high availability requirements. Principles are easy to quote, but how does an organization implement them effectively?
Cybersecurity
Cybersecurity endures as a top priority for federal agencies, the Trump administration, and Congress. So whatever other budget battles that might lie ahead, cyber will remain an important opportunity. In fact, two recent reports ought to scare the heck out of not just agency managers but pretty much every American.
Cybersecurity
The “Internet of Things”, or IOT: we’ve all heard the term, but what does it really mean? More importantly, how do we secure all of these … “things”?
Cybersecurity
Cell phones, tablets, wearables, and other mobile devices dominate our lives. I personally bring my trusty iPad to everywhere, and, like everyone else, have my phone with me at all times. The biggest attack surface for any enterprise, then, may well be these devices. How can we assess the threats? What are the components in need of protection? What are some key methods of protecting them?
Cybersecurity
Earlier this month, I wrote about the Zero Trust model for security. As I proceed through these daily blogs, I find many of them complement the ZT model; data security is one. Outside the IOT world, the goal of cybersecurity is to protect data. The Zero Trust model recognizes this and focuses on keeping security close to the asset, and portable.