Join us Wednesday, Nov. 13 from 9:30 a.m.-5:00 p.m. ET/6:30 a.m.-2:00 p.m. PT for a full day of content focused on preparing you for the tech landscape of 2020.
Search Results for: cio
SOC-as-a-Service for State and Local Governments
Security operations centers (SOCs) are centralized units that deal with security issues on an organizational and technical basis.
Empower Your Employees by Not Micro-Managing
Although leaders may truly believe in the tenets of empowerment and inclusion, they often slip back into micro-management.
2019 Agile Government Leadership Summit
Check out AGL’s 2019 summit to learn, network, and hear from an incredible lineup of speakers.
Misnamed but Mission-Critical: FITARA Five Years Later
FITARA is misnamed, but that’s not to suggest the law has failed to transform the way federal agencies go about investing in technology.
Identity and Access Management in State and Local Governments Today
When you consider the law enforcement sector and how often cases span cities, counties and even state lines, it’s imperative that governments can coordinate and easily share information. A federated identity system could lay the groundwork for new systems that allow for these seamless connections.
User Experience Is Key for ICAM Branch Chief at USDA
Adam Zeimet, Branch Chief for ICAM at the Agriculture Department, has been with the program since it started. It’s evolved since then to support more than 120,000 employees and 750,000 public users. He talked to GovLoop about central considerations to ICAM at the agency.
A Culture of Innovation Is Key to TSA’s Cloud Strategy
Under its Cloud Strategy 2.0, the Transportation Security Administration (TSA) will focus on creating an environment in which employees can innovate IT capabilities to better support mission objectives.
DISA’s Priorities for Identity, Credential and Access Management
Brandon Iske, ICAM Lead at the Defense Information Systems Agency (DISA), talked to GovLoop about the agency’s focus on IAM issues and its future plans.
Thinking Like an Attacker to Protect Privileged Access
“Privileged access can be exploited and used to gain access to sensitive data,” said Jermyn. “We’ve seen time and time again, attackers will get into the network. It’s not about keeping them out; it’s about limiting what they can do once they are in the network. How do we stop them from escalating privileges and… Read more »