POPULARITY
In this episode of Unveiled: GovCon Stories, we explore what happens when innovation meets bureaucracy in government contracting. Dean Niedosik shares how his team developed a promising cyber/AI product—only to have progress stalled by the pandemic and ultimately shut down by corporate decision-making. He reflects on navigating leadership hurdles, the shift to small business agility, and the balance between structure and creativity. It's a candid look at resilience, pivoting under pressure, and rethinking innovation in federal markets.Dean Niedosik is the Director of Growth at HumanTouch (HT), with over 20 years of experience in strategic innovation, tech sales, and systems integration across the public and private sectors. He leads business development, capture, and marketing to drive federal sector growth through data management and AI/NLP solutions. His career includes building the Red Bull brand, launching Alcatel Mobile's IP products, and leading strategic innovation at Booz Allen. Dean also co-chairs AFCEA's International Small Business Committee and Innovation Roundtable, championing small business success in government markets.Call(s) to Action:Help spread the word about Unveiled: GovCon Stories: https://shows.acast.com/unveiled-govcon-storiesDo you want to be a guest or recommend a topic that you would like to learn or hear about on the podcast? Let us know through our guest feedback and registration form.Links:HumanTouch: https://www.humantouchllc.com/ Case Studies & Insights: https://www.humantouchllc.com/blog HumanTouch Capability Statement HumanTouch SolutionsSponsors:The views and opinions expressed in this podcast are solely those of the hosts and guests, and do not reflect the views or endorsements of our sponsors.Withum – Diamond Sponsor!Withum is a forward-thinking, technology-driven advisory and accounting firm, helping clients to be in a position of strength in today's complex business environment. Go to Withum's website to learn more about how they can help your business! Hosted on Acast. See acast.com/privacy for more information.
Maintaining legacy communications systems is expensive and can leave military services like the Navy and Marine Corps behind. During AFCEA West in San Diego, Verizon Navy and Marine Corps Public Sector Director David Reaves explained how he's seeing the Navy's challenges in modernizing voice and data communications, focusing on the Defense Department's mandate to transition from outdated systems to IP-based infrastructure. Reaves said that the high cost and difficulty of maintaining legacy systems means that the Navy should modernize to an enterprise-wide deployment strategy to ensure consistency and cost-effectiveness across bases. Reaves also discussed the importance of converging voice and data networks for operational efficiency and explained how the Navy can leverage existing contracts to streamline the acquisition of modern technologies like Voice over Internet Protocol (VoIP).
The Naval Postgraduate School's recent partnership with the Defense Innovation Unit formalizes NPS' focus on fostering innovation in the school's student body. NPS President Ann Rondeau said Thursday that the the school not only supports innovation, but lays the foundation for creative thinking, collaboration and finding real-world solutions to support the Defense Department. During AFCEA West in San Diego, California, California, Rondeau described NPS as a hub for "warrior scholars" – experienced military, international, civilian government and industry professionals – who work together to address real challenges facing DOD. She added that the school's curriculum is also continuously updated based on feedback, ensuring relevance and responsiveness to evolving needs like AI, quantum and other emerging technology.
The Naval Information Warfare Systems Command supports technical authority and acquisition command for information warfare, which presents modernization challenges as the speed of technology evolution increases. At AFCEA West in San Diego, NAVWAR CIO Ben Motten said his office is empowering the workforce by providing the necessary tools and capabilities, allowing warfighters to focus on the mission rather than the technology itself. Legacy infrastructure and software present hurdles, he said, but they also provide an opportunity to modernize by "leapfrogging" to newer technologies like low-code/no-code platforms and future spectrum connectivity technologies.
In 2024, the Defense Innovation Unit (DIU) and the Naval Postgraduate School (NPS) signed a memo of understanding to codify their joint effort to develop future leaders to manage innovative solutions. During AFCEA West in San Diego, Kaitie Penry, director of emerging technology and innovation at the Naval Postgraduate School, discussed how that agreement is going. She highlighted the impact it has had on developing leadership skills in students, particularly in acquisition and innovation, and preparing them for senior-level positions in the Defense Department. Penry also discussed how she is fostering an innovative mindset to meet DOD and student needs.
Security and agility are critical to balancing the Department of the Navy's zero-trust journey amid evolving cloud modernization priorities. At AFCEA West in San Diego, California, DON's CIO Jane Rathbun discussed the service's recent zero-trust achievements with its Flank Speed initiative to enable secure cloud deployment. Rathbun shared some of the lessons learned for other organizations throughout the journey. She also highlighted how collaboration between cyber operators, acquisition communities, resource sponsors and requirement owners enabled the service's success and discussed how the role of operator feedback, especially from cyber operators, is shaping IT architecture and future modernization.
The Marine Corps is modernizing its systems to keep pace with rapidly evolving technology while centering warfighters. During AFCEA West in San Diego, California, Marine Corps Systems Command Cyber Technology Officer Gaurang Dävé said that innovation requires speed in delivering capabilities to the warfighter. Dävé highlighted that Marines act as sensors in the battlespace, needing the best information in real-time for informed decision-making. Dävé also discussed the Marine Corps' approach of containerized, modular applications and the service's collaborative work with the Army's software factory in Austin, Texas, that allows Marines to code applications and receive hands-on training in innovative technology.
During AFCEA West in San Diego, California, Mark Gorak, Defense Department's principal director for resources and analysis and director of the Cyber Academic Engagement Office, discussed his priorities for cyber talent and retention amid new federal leadership. Gorak lauded his office's efforts to lower the average days it takes to hire cyber talent and discussed his efforts to retain cyber talent. The Cyber Workforce Strategy, which has been deployed since 2023, has been implemented hand in hand with ongoing and emerging innovations within and outside of the department. Gorak has overseen hiring thousands of employees. He noted that departures from the agency allow other agencies and industry to hire talented individuals from the DOD, creating an ecosystem of like-minded experts throughout government.
Countering adversaries in the cyber domain requires the Navy to harness information at the speed of technological innovation. During AFCEA West in San Diego, California, Vice Adm. Craig Clapperton, commander of U.S. Fleet Cyber Command and Navy Space Command, discussed how he is approaching the evolving landscape of cyber threats and developing strategies to counter them in his dual-hat role. From recent cyber incidents like SolarWinds and Volt Typhoon, to the role of emerging technologies like AI, Clapperton dives into the complexities of modern cyber warfare and explains how he's eyeing collaboration with industry partners and allies, recruiting top cyber talent and staying ahead of adversaries in a rapidly changing digital environment.
Zero Trust is becoming a critical pillar of the department of Defense's cybersecurity strategy. The strategy, embodied by the motto of “never trust, always verify,” demands a new outlook on cybersecurity. Randy Resnick discusses why Zero Trust is so important, how his office is working to reshape the way DOD employees view zero trust, and how clear standards can help the DOD and other agencies adopt zero trust in their operations.
From the battlefield to headquarters, the potential of 5G networks opens the door for new partnerships, strategies and emerging technologies. At TechNet Cyber, Defense Department 5G Cross Functional Team Director Juan Ramirez discusses how 5G unites the department under multiple interoperability efforts, prepares the warfighter for the fight of the future and enhances the cybersecurity of the DOD apparatus.
The Defense Department's Fulcrum: DoD Information Technology (IT) Advancement Strategy unites many of DOD's cybersecurity strategies under one umbrella. It also provides a roadmap through 2029 for the DOD CIO's essential support of the National Defense Strategy. Robert Franzen, Deputy Customer Experience Officer at the DOD CIO's office, breaks down the department's recently unveiled Fulcrum and how it will support warfighters and the entirety of the Defense Department.
The military services are prioritizing developing technology in warfighting scenarios and fielding it quickly. At the Department of the Navy, officials are thinking about how to bring forward a set capabilities that can be interoperable throughout different scenarios while maintaining security. At AFCEA TechNet Cyber, Navy CIO Jane Rathbun discussed interoperability in the defense industry and platform standardization and cybersecurity.
Every day, thousands of attacks are directed at U.S. military, government and defense industrial base systems. Protecting those systems is increasingly a key part of the national defense mission and keeping pace with adversaries is critical. Gen. Timothy Haugh leads Cyber Command and the National Security Agency in a dual-hat role. According to him, the ability to adapt and build resiliency is key to building cybersecurity. At AFCEA TechNet Cyber, Haugh broke down how threats are evolving, his plans for combatting them and how cybersecurity impacts national security.
Officials at Joint Force Headquarters – Department of Defense Information Network (JFHQ-DODIN) need to protect the DOD's thousands of employees when they use the network. To secure the system, JFHQ-DODIN uses a multi-faceted approach to cybersecurity, including adaptive intelligence, identity management and partnerships. At AFCEA TechNet Cyber, JFHQ-DODIN Director of Operations Col. Michael Reeder discussed data security, the importance of collaboration within the cybersecurity community and DOD's unified force approach to network operations.
Challenges can be opportunities when it comes to software modernization at the Defense Department. The agency is meeting these opportunities with the release of its new Fulcrum strategy and ongoing zero trust efforts, according to DOD Director of Cloud & Software Modernization George Lamb. At AFCEA TechNet Cyber, Lamb discussed progress made on the Pentagon's 2022 software modernization strategy, how the new Fulcrum strategy ties into software modernization goals and the necessity of zero trust being baked into all DOD operations.
Connectivity is integral to the warfighting force, but connecting the dispersed military and civilian workforce around the world is challenging. It requires a balance of speed and security while also prioritizing the user experience and modernizing infrastructure. At AFCEA TechNet Cyber, Defense Information Systems Agency J6 Global Services Directorate Vice Director Brig. Gen. Michael Cornell discusses cybersecurity efforts and how the department is embracing best practices and innovation while deploying new technology.
As the third largest network in the world behind the U.S. and China, Joint Force Headquarters – Department of Defense Information (DODIN) has many vulnerabilities it must secure. A key part of this mission is recruiting the talent to fill its numerous open cyber roles. DODIN Network Deputy Commander Brig. Gen. Heather Blackwell said key to building strong cybersecurity is having an engaged and innovative workforce. At AFCEA TechNet Cyber, Blackwell discussed how culture, the workforce and technology work together to secure DODIN.
One year since the publication of the Defense Department's Cyber Workforce Implementation Plan, the department has made progress on filling 30,000 open cybersecurity roles. At AFCEA TechNet Cyber, DOD Principal Director for Resources & Analysis Mark Gorak discusses the plan and how it's enabled the department to fill about 3,000 jobs so far. He also breaks down the next steps ahead in achieving full department efficiency and the plans to identify, upskill, train and retrain a mission-focused cyber workforce.
Jason Miller is the Executive Editor of Federal News Network and has covered the federal technology space over the course of five Presidential administrations. He brings his wealth of knowledge as he joins Tech Transforms to talk about AI, the top things government agencies are working towards this year and his predictions around FedRAMP changes. Jason also pulls on his decades of experience as he discusses events that changed the nation's approach to cybersecurity and the longstanding need to have data that is better, faster and easier to use.Key Topics00:00 AI's impact on texting and cloud's significance.04:17 Federal Enterprise Risk Management in government tech.07:20 AI trends shifting toward real-time application.11:22 2025 and 2027 deadlines for zero trust.13:31 CISOs and CIOs adapting to modern technology.16:45 Frustration with FedRAMP leads to reform efforts.21:39 Applying similar model to expand decision-making.23:37 GSA discussed OSCAL at private industry day.27:55 CISA's role has grown within DHS.30:33 Increased transparency in cybersecurity changed approach significantly.34:17 Reflecting on the 2006 significance of data.39:19 AFCEA events bring together good people.42:53 Fascination with government architecture and dedicated government workers.44:35 Promoting positivity and accountability in government industry.Cybersecurity Evolution: Examining Technology's Political Neutrality and AI Commitment Through Administrative ChangesConsistent Focus on Cybersecurity Evolution Across Political AdministrationsJason expressed a clear conviction that technology issues are largely immune to political fluctuation and are a continuity in government agendas. Reflecting on his experience across five administrations, he noted that the foundational technological discussions, such as cloud adoption, cybersecurity enhancement and overall IT improvement are fundamentally preserved through transitions in political leadership. He highlighted that the drive to enhance government IT is typically powered by the resilience and dedication of public servants, who generally carry on valuable reforms and initiatives regardless of the sitting administration's politics. These individuals are essential to sustaining progress and ensuring that technology remains a key priority for effective governance.Federal IT Policies Consistency: "No one comes in and says, I'm against AI, or cloud is bad, move back on premise, or cybersecurity, defund cybersecurity. I think those are the issues that stay the same." — Jason MillerExecutive Orders and AI AdoptionAddressing the specifics of executive orders, particularly those influencing the implementation and development of artificial intelligence (AI), Jason examined their historical persistence and their potential to shape operational practices in the government sector. He and Mark discussed how the stability of AI-related orders through various administrations is indicative of a broader governmental consensus on the integral role AI holds in modernizing federal operations. Despite changes in leadership, the incoming officials frequently uphold the momentum established by their predecessors when it comes to leveraging AI. Indicating a shared, bipartisan recognition of its strategic importance to the government's future capabilities and efficiencies.Cybersecurity Evolution: Zero Trust Principles and Network Security Challenges in Federal AgenciesZero Trust and Cybersecurity BudgetingDuring the podcast, Carolyn and Jason delve into the current trends and expectations for federal cybersecurity advancements, with a particular focus on zero trust architecture. Their discussion acknowledged that agencies are on a tight schedule to meet the...
It's March 15th, 2024, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the recent Cybersecurity and Infrastructure Security Agency hack, and it's suspected perpetrators and implications. We have perspectives from Julie Chatman in Washington, D.C., Katy Craig in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania, and Olimpiu Pop from Transylvania, Romania. We also have a couple of interviews from last month's, AFCEA cybersecurity conference held in San Diego, California.We'll start with Katy Craig.Resources and 300+ episodes, all free, all ungated:https://505updates.com/
It's March 8th, 2024, International Women's Day, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the risk of backdoored AI. We have perspectives from Julie Chatman in Washington, D.C., Katy Craig in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania, and Olimpiu Pop from Transylvania, Romania. We also have a couple of news stories at the end, and some interviews from the annual AFCEA conference held in San Diego, California last month.We'll start with Julie Chatman.Resources and 300+ episodes, all free, all ungated:https://505updates.com/
Leveraging the next generation's digital skill sets, comfort with technology and innovation is key to the Marine Corps' vision for its future software-savvy workforce. Lt. Col. Charlie Bahk, director of the Marine Corps Software Factory launched last year, tells GovCIO Media and research at AFCEA West that “all you have to do is just kind of get out of the way a little bit.” Bahk also discusses the evolution of the Marine Corps Software Factory as it nears its one-year anniversary, challenges he foresees in developing software capabilities for warfighters and the value of collaboration and resourcefulness in software development.
Metrics are critical to assessing a contract's or program's success in IT procurement at the Navy. Measuring success can be difficult without these clear parameters. Justin Fanelli, acting CTO at the Department of the Navy and technical director at Navy PEO Digital and Enterprise Services, discussed with us at AFCEA West the ways in which the Navy is measuring program success. He said when a program does not work, inertia needs to be fought. "When something moves, we take it down," he said. He also highlights how the Navy is encouraging more entrants into the acquisition process and how the Navy partners with industry to scale innovation.
The U.S. Marine Corps is in the middle of modernizing its networks into a single enterprise network to improve identity management and services. The team is upgrading software and hardware to improve latency and cybersecurity, and is leveraging artificial intelligence as part of these modernization plans. At AFCEA West, Shery Thomas, cyber technology officer at the Marine Corps Forces Cyberspace Command, discusses the state of the Marines' network modernization and the ways his teams are ensuring the network is accessible and secure against future threats.
Partnerships play a critical part of the innovation work across the Defense Department. The complex global threat landscape, in both the kinetic and cybersecurity domains, requires partnerships to solve some of the most pressing national security challenges. Assistant Deputy Chief of Naval Operations for Information Warfare Jennifer Edgin discussed at AFCEA West the ways her office is leveraging partnerships, using emerging technology and modernizing its systems.
The Defense Department is undergoing largescale modernization efforts that require close attention to building the infrastructure that delivers information quickly, but also securely. Digital transformation in government requires a mindset that considers all aspects of the organization, partners and stakeholders. While at AFCEA West in San Diego, Equinix Senior Director of Segment Marketing for the Americas D.R. Carlson sat down with us to discuss the common pain points organizations experience in digital transformation journeys, how AI can aid modernization and the ways to bridge legacy and new systems — plus what this all means for defense organizations.
The Navy's systems and data operations exist in a challenging environment that requires strong identity management to secure threats, partnerships across the Defense Department and technology innovation. At AFCEA West, Navy CIO Jane Rathbun discusses how the service is avoiding common pain points in modernization and introducing more structure, data and flexibility. She also highlights how the service is thinking about innovation and mixing traditional with new approaches to stay ahead of the curve in the ever-evolving technology landscape.
This episode we're diving into zero trust at the Defense Department. Specifically, how that is playing out for the Indo-Pacific region. We recently had the opportunity to connect with several leaders at the AFCEA TechNet Indo-Pacific conference in Honolulu where they shared with us how they're thinking about this quickly changing landscape and what it means for cybersecurity. This includes an update on DOD's review of submitted zero trust implementation plans, and also a peek at some of those plans at the Air Force and Indopacom. Featured interviews include: Randy Resnick, Director, Zero Trust Portfolio Management Office, DOD. https://governmentciomedia.com/dod-zero-trust-chief-were-start-multi-phased-journey Justin Stolpman, Director, Zero Trust Functional Management Office, Air Force. https://www.governmentciomedia.com/air-force-eyes-next-gen-gateways-amid-zero-trust-plan Paul Nicholson, Deputy CIO and Executive Director of Coalition Communications, Indopacom. https://governmentciomedia.com/look-zero-trust-theater-indopacom
This episode we're diving into some defense technology perspectives, specifically for the Indo-Pacific region. We recently had the opportunity to connect with leaders at the AFCEA TechNet Indo-Pacific conference in Honolulu where they shared how they're thinking about the quickly changing landscape and what it means for defense programs, software factories, cloud modernization and data centricity. Featured interviews include: Rob Vietmeyer, Chief Software Officer at DOD. https://governmentciomedia.com/dod-software-chief-breaks-down-tech-shifts-pacific-region Sharon Woods, Director of DISA's Hosting and Compute Center. https://governmentciomedia.com/disa-hac-director-shares-commercial-cloud-capability-progress-indo-pacific Andrew Hong, Deputy Director of Cyber Portfolio, Defense Innovation Unit. https://governmentciomedia.com/diu-brings-new-mindset-defense-technology Indopacom CIO Gen. Mark Miles. https://governmentciomedia.com/indopacom-cio-looks-data-centricity-assured-command-and-control
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
The Great Lakes used to have iron ore boats running from Minnesota to Ohio. The ship was not very agile but was unstoppable at 12 knots. There is a close parallel with the federal government. It is such a massive entity that it is unstoppable when it sets its sights on a goal. However, when challenged with new threats, it has a difficult job altering course. Right now, the federal government understands it is being attacked every second. Sometimes, the traditional methods can leave it vulnerable to attack. In 2023 the Executive Office of the President released its strategy for cyber security. The 57-page document includes sixty-five specific actions to change the massive ecosystem of federal technology. Today, we have Jim Richberg from Fortinet in the studio to break it down for listeners. His opinions are based on a twenty-year career in the intelligence community as well as decades of service in many organizations like AFCEA, the World Economic Cybersecurity Leadership Forum, and the Forbes Technology Council. During the interview, Jim gives you the salient points. He suggests that the shift of liability from the government to commercial organizations is a major point. From a software development perspective, Jim Richberg argues that the shift to the left into incorporating security into software design is significant as well. This episode will help you put the new strategy in perspective, and you can see how it impacts your agency. Follow John Gilroy on Twitter @RayGilray Follow John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Listen to past episodes of Federal Tech Podcast www.federaltechpodcast.com
Listen in as your host Just Nate and the one and the only co-host DK is back to chat with great new friends. We are speaking to the NDIA Young Professionals. Dominic Archuleta, Bernadette Maisel and Mairead Levison. The NDIA Rocky Mountain Chapter is very focused on encouraging young professionals to participate in chapter events, run for chapter offices and to network with some of the chapter's 1,400 members. If you have ideas or suggestion on events, activities or actions that support the young professionals in our community we would love to hear from you. The National Defense Industrial Association, Rocky Mountain Chapter is proud to present the 40th Annual Rocky Mountain Ball. The Chapter will hold the ball at the Double Tree Hilton on 18 August 2022. As always, this is a black-tie event (mess dress) considered a widely attended gathering with a mixture of retired and active-duty military, civilians, and industry. Join us on August 18 – 40th Annual Rocky Mountain Ball Date: August 18, 2023Location: Double Tree by Hilton 1775 E Cheyenne Mountain Blvd – (just off I-25 and Circle) At the ball, we will present the Hartinger Award and Patriot Awards again. Hartinger Award this year honors General James H. Dickinson, Commander, United States Space Command. Patriot Awards honor military members who have gone above and beyond in the performance of their mission. We will post more information about the Patriot Awards recipients as we get closer to the Ball. We will have dignitaries from all branches of service and some of our sister nations, such as Canada, the United Kingdom, Australia, and New Zealand. We will also have industry and corporate VIPs in attendance. Please join us for the IMAGE 2023 Golf Tournament to benefit STEM scholarship activities of our Colorado Springs local chapter of NDIA, AFA, & AFCEA! Day: August 16th, 2023Location: Eisenhower Golf Course, Blue Course, USAFA, Building 3170, USAFA Academy, CO 80840Phone: (719) 333-2606 To learn more about NDIA check them out here: https://ndiarmc.org/ To learn more about NDIA Young Professionals check out their website here: https://ndiarmc.org/young-professionals-committee/ To find out more about the Smalls or become a member, please check us out at www.thesmalls.org To contact Just Nate: justnate@thesmalls.org — Send in a voice message: https://anchor.fm/thesmalls/message Support this podcast: https://anchor.fm/thesmalls/support www.patreon.com/thesmalls --- Send in a voice message: https://podcasters.spotify.com/pod/show/thesmalls/message Support this podcast: https://podcasters.spotify.com/pod/show/thesmalls/support
We close doors and windows and we lock them to keep people out. Our online life, and especially our business' online presence, should be no different. If left open, threats will find a way in, just as they would if you left a physical door unlocked. And whether those threats are in cyber security or in ways that your business is struggling, the result is the same: resilience and a plan for threat defense is needed.Interested in exploring this deeper, I (Kyle) interviewed Jeremy Miller, CEO of Lionfish Cyber Security™. Jeremy shared how so many things are not viewed as threats because we can't see them. He related this to the importance of resiliency and handling threats in your business, whether they be online or simply the tough reality of building a small business with limited resources, limited money and the occasional wrong employee.“You're going to go into this mental funk where you're getting your butt beat every day. Nothing's going right for a while... and you've got to figure out how you're going to bounce back… It's very much a resiliency type endeavor.” -- Jeremy MillerWhat You'll LearnWays we unknowingly let threats inHaving an impactResiliency in businessMake it through the missionSometimes people just aren't a fitTake it times 5Recommended ResourcesConnect with Jeremy MillerJeremy Miller is the CEO of Lionfish Cyber Security™. He served in the Army as a Green Beret in the Special Forces. Jeremy has founded and managed several tech companies that built SaaS software to solve industry issues: Investway and AppealTaxes-Now, to name a few. He now focuses on building a SaaS and service component for cyber security compliance management, apprenticeship management, and more. He is proud to be a part of the cyber war effort and help protect our country, its companies, and their families from those who would do us harm online, or otherwise.In addition, Jeremy has been President for the Special Forces Association Chapter 500 in Indiana for the last few years to help and assist in transitioning soldiers out of the service and providing a support system for them and their families. He is also the current AFCEA chapter Indiana President and on the board of MedStreet.org where physicians volunteer their time to help homeless individuals get back on their feet. Past board positions include Chairman of CYT Indy Christian Youth Theater, VP and Education Chair for Central Indiana Real Estate Investors Association, and Executive Director for VetsInHouses (helping to house homeless vets).When not working, Jeremy enjoys spending time with his wife, two children, and two dogs.Website: lionfishcybersecurity.comEmail: jeremy@lionfishcybersecurity.comLinkedin - Jeremy MillerLinkedin - Lionfish Cyber SecurityInstagramFacebookTwitterCONNECT WITH KYLE MALONEYKyle Maloney is a Senior Account Executive at FullStack PEO and co-host of the Savage to...
In this episode, Wesley Belleman, Consulting Engineer at Colossal LLC, joins Maria and Gianna to discuss marketing in the federal government. Wesley began his career in the military in acquisitions, specifically as a cybersecurity operations officer. Here, he was in charge of multi-million dollar programs, acquiring cybersecurity for the space force, and more. From there, he went into Palo Alto Networks and finally Colossal LLC, a value-added reseller providing services specific to the products they sell. Because he has advertised and marketed products internally as a customer in his previous roles, Wesley has a solid understanding of the challenges marketers face. Since the Department of Defense is the country's largest employer, there is a ton of internal business that goes on within it overall. Wesley touches on Kraken, a newly released product that the Space Force is currently leveraging for public defense. He worked with a team of engineers and contractors to design, build and deploy the product. It required marketing to get people within the space force on board with implementing the product. Wesley also highlights the various AFCEA events coming up nationwide. When building Kraken, Wesley also had to build consensus internally to get the product off the ground. He began this process by getting certified on the product and fully understanding it inside out. On that, he leveraged the strength of his colleagues on his team to fulfill different operational roles. The final step was to get to know the customers and what exactly they are looking for. It is crucial to leave your opinions and ideals at the door and understand what the customer wants from a cybersecurity product. He also recommends all founders use the resources and team members they already have. Although it is still growing, Kraken officially launched in 2019. Finally, our guest and hosts engage in a fun guessing game to reveal what career Wesley would pursue outside of the cybersecurity marketing field. Links: Visit Wesley on LinkedIn. Follow Gianna on LinkedIn. Catch up with Maria on LinkedIn. Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.
The Pentagon has a cyber workforce problem: 30,000 cyber positions remain unfilled, but malicious cyber activity isn't slowing down. Defense cyber leaders warn future conflicts will combine kinetic and information warfare, elevating the importance of a robust cyber workforce. DOD Principal Director for Resources & Analysis Mark Gorak joins us live from AFCEA TechNet Cyber 2023 in Baltimore to discuss these challenges and his plans to address them.
Operating and hardening the Defense Department's networks is a highly complex undertaking. Training and retaining the workforce, keeping up with a constantly changing environment of technology and emerging capabilities and threats are continuous challenges not just for the Army, but also for all the services. Lt. Gen. Maria Barrett, commanding general of Army Cyber Command, discusses how Army Cyber forces are working globally to secure networks, responding to the needs of the warfighter and preparing for the future of cyber warfare.
Live from TechNet Cyber 2023 in Baltimore, Maryland, Defense Department Deputy CIO Lily Zeleke and Chief Software Officer Rob Vietmeyer discuss software factories, DevSecOps, zero trust and the Joint Warfighting Cloud Capability (JWCC). These IT modernization initiatives are transforming the department to be more tech-savvy as information dominance becomes critical to winning future conflicts.
Defense Department CIO John Sherman joins us live from TechNet Cyber 2023 in Baltimore, Maryland, to peel back the layers of the Joint Warfighting Cloud Capability (JWCC) and the department's zero trust strategy to show how they're informed by JADC2 priorities and contribute to better data transport and interoperability with coalition partners. Sherman also discusses how cloud initiatives at the military services will complement JWCC efforts.
The Marine Corps is undertaking largescale modernization of its technical capabilities. As Deputy Commandant for Information Lt. Gen. Matthew Glavy puts it, all capabilities cannot be executed without tech especially in an ever-changing environment. Glavy discusses the efforts around computing at the edge, the foundational standpoint of information ahead of the upcoming Marine Corps Warfighting Publication-8 and what all this means for cyberspace operations.
With a challenging maritime computing environment, the Coast Guard supports several missions for the departments of Defense and Homeland Security. Assistant Commandant for C4 & IT Rear Adm. Christopher Bartz discusses his workforce, cybersecurity and tech priorities, including how he's approaching the service's own take on interconnected data systems akin to DOD's JADC2 as well as a new software factory.
BONUS EPISODE: Laura and Kevin Talk AFCEA West. AFCEA WEST connects the industry professionals who design and build the platforms, equipment and weapons with the designers of communications and technical systems.The premier naval conference and exposition on the West Coast, WEST is now in its 33rd year of bringing military and industry leaders together. Co-sponsored by AFCEA International and the U.S. Naval Institute, WEST is the only event in which the makers of platforms and the designers of technologies can network, discuss and demonstrate their solutions in a single locale.One recurring highlight of WEST is the chance to hear from the Sea Service Chiefs - the Chief of Naval Operations, the Marine Corps Commandant and the Coast Guard Commandant. In addition to the main program, WEST offers three Engagement Theaters: Marine, General, and Information Warfare. These smaller, more intimate venues allow military, government and industry professionals to drill deeper into specific topics and issues. More information about WEST speakers and panel presentations is available online.Wasabi is fundamentally transforming cloud storage with the industry's simplest, fastest and most affordable storage solution. Unlike legacy cloud storage services with confusing storage tiers and complex pricing schemes, Wasabi storage is inherently easy to implement and incredibly cost-effective to scale.
The age of information superiority is more than cybersecurity. For Department of the Navy CIO Aaron Weis, it's the “golden requirement” to securely move any data from anywhere to anywhere, paving the way for programs like Project Overmatch in the Defense Department's JADC2 concept. Weis discusses the potential game-changing impacts to data as we know it with technologies like Starlink and emerging foundational AI, as well as how he's viewing these in the context of the Navy's approach to tech and “Cyber Ready” strategy.
DISA's Hosting and Compute Center (HaCC) is addressing challenges to various cloud capabilities across the Defense Department. Part of this means enhancing the overall customer experience of acquisition and breaking down silos across teams. HaCC Customer Experience Lead Kayne Kreitzer talks everything CX, including the tools that are helping the community navigate the challenging environment of cloud computing and acquisition such as the Account Tracking and Automation Tool (ATAT) and the DISA Acquisition Package Preparation System (DAPPS).
Entellect is a full life-cycle Business Development boutique company that works with companies to help scale their current processes and resources. Our cadre of experts helps companies scale up by augmenting their current resources and elevating their marketplace status to make them more competitive. In addition, we offer tailored solutions to expand a company's capabilities and efficiently support enduring success. Entellect has aided dozens of businesses in understanding the federal procurement landscape, navigating the competitive terrain, and winning contracts totaling more than $150B in value. We employ government contracting thought-leaders, individuals who share their knowledge with their clients and the GovCon community at large. These thought-leaders speak at AFCEA, regional PTACs, VETS, and other venues on GovCon topics, including partnering, debriefings and protests, capture management, pipeline management, and more. Entellect supports and mentors small businesses to understand and thrive in the GovCon market and provides executive coaching support to SDVOSB, 8(a), WOSB, and other minority-owned small business leaders. We provide various services, including Capture Management, Proposal Management, Strategic Pricing, Contracts Management, Financial Management, and Business Operations Optimization. These services are critical in allowing companies to win bids in the short term and become more efficient, cost-effective firms thereafter. As President of Entellect LLC, Ms. Tan Wilson provides full-lifecycle business support to primarily small businesses. She is an experienced and successful entrepreneur with over 20 years of experience in business development and program management across federal and commercial business sectors. As a supporter of the small business community, Ms. Wilson aids businesses in their strategic planning, business development, capture management, proposal management, partnership development, operations support, and leadership coaching. She brings extensive management experience in leading large project teams of diverse stakeholders, ranging from C-level executives. In addition, she was the 2021 Chair of AFCEA's Small Business Committee (SBC), Small Business Person of the Year for 2020, and has provided invaluable support to AFCEA small businesses. Ms. Wilson is also a Board Member on AFCEA International and Emeritus Chair of the SBC. Follow Tan Wilson on LinkedIn for all tips and gems about her experience in #GovCon: https://www.linkedin.com/in/tanwilsonpmp/ Learn more about Entellect and the work they do: entellectllc.com --- Send in a voice message: https://anchor.fm/governmentcoins/message Support this podcast: https://anchor.fm/governmentcoins/support
Entellect is a full life-cycle Business Development boutique company that works with companies to help scale their current processes and resources. Our cadre of experts helps companies scale up by augmenting their current resources and elevating their marketplace status to make them more competitive. In addition, we offer tailored solutions to expand a company's capabilities and efficiently support enduring success. Entellect has aided dozens of businesses in understanding the federal procurement landscape, navigating the competitive terrain, and winning contracts totaling more than $150B in value. We employ government contracting thought-leaders, individuals who share their knowledge with their clients and the GovCon community at large. These thought-leaders speak at AFCEA, regional PTACs, VETS, and other venues on GovCon topics, including partnering, debriefings and protests, capture management, pipeline management, and more. Entellect supports and mentors small businesses to understand and thrive in the GovCon market and provides executive coaching support to SDVOSB, 8(a), WOSB, and other minority-owned small business leaders. We provide various services, including Capture Management, Proposal Management, Strategic Pricing, Contracts Management, Financial Management, and Business Operations Optimization. These services are critical in allowing companies to win bids in the short term and become more efficient, cost-effective firms thereafter. As President of Entellect LLC, Ms. Tan Wilson provides full-lifecycle business support to primarily small businesses. She is an experienced and successful entrepreneur with over 20 years of experience in business development and program management across federal and commercial business sectors. As a supporter of the small business community, Ms. Wilson aids businesses in their strategic planning, business development, capture management, proposal management, partnership development, operations support, and leadership coaching. She brings extensive management experience in leading large project teams of diverse stakeholders, ranging from C-level executives. In addition, she was the 2021 Chair of AFCEA's Small Business Committee (SBC), Small Business Person of the Year for 2020, and has provided invaluable support to AFCEA small businesses. Ms. Wilson is also a Board Member on AFCEA International and Emeritus Chair of the SBC. Follow Tan Wilson on LinkedIn for all tips and gems about her experience in #GovCon: https://www.linkedin.com/in/tanwilsonpmp/ Learn more about Entellect and the work they do: entellectllc.com --- Send in a voice message: https://anchor.fm/governmentcoins/message Support this podcast: https://anchor.fm/governmentcoins/support
Take a listen as your hosts "Just Nate" and DK sit down and talk with Kimberly Underwood, Senior Editor, SIGNAL Magazine, AFCEA International. Kimberly has been a Senior Editor for AFCEA for over 4 1/2 years. Kimberly has 18+ years' experience as freelance and full-time writer, researcher, and analyst with expertise blending creativity and artistry with more tangible factors, such as research, data analysis, and industry trends. Driven to produce precise articles, biographies, reports, and profiles. The boys and Kimberly talk about everything from Quantum Research International to how we got started on "The Smalls". We all sit down right after the Rocky Mountain Cyber Symposium. To read the SIGNAL Magazine check it out here: https://www.afcea.org/content/?q=signal# To find out more about the Smalls or become a member, please check us out at www.thesmalls.org To contact Just Nate: justnate@thesmalls.org — Send in a voice message: https://anchor.fm/thesmalls/message Support this podcast: https://anchor.fm/thesmalls/support www.patreon.com/thesmalls --- Send in a voice message: https://anchor.fm/thesmalls/message Support this podcast: https://anchor.fm/thesmalls/support
“I don't care about organization charts, I care about the unity of effort.” In this episode, I cover some of the top quotes I heard while attending the 2022 AFCEA Tidewater Integrated Combat Symposium in Hampton, Virginia. I had a great time hearing from great leaders on what the Air Force needs from the cyberspace operations and information warfare community, and I'm excited for my next chapter in Air Combat Command. https://www.afcea-tidewater.org/ ////////// LINKS: Main - http://www.constantelevation.co Facebook - http://www.facebook.com/ConstantElevation.co Instagram - https://www.instagram.com/gaberock01/ (@gaberock01) YouTube - https://www.youtube.com/c/GabrielAvilla --- Support this podcast: https://anchor.fm/constantelevation/support
AFCEA TechNet Cyber 2022 marks another return to in-person events, and Senior Researcher Kate Macri is here to discuss top takeaways and themes from the conference. Topics include ICAM solutions, zero trust, cyber operations and what it's like to be in-person again after two years of online panels.
Take a listen as your hosts "Just Nate" and DK sit down and talk with Kimberly Underwood, Senior Editor, SIGNAL Magazine, AFCEA International. Kimberly has been a Senior Editor for AFCEA for over 4 1/2 years. Kimberly has 18+ years' experience as freelance and full-time writer, researcher, and analyst with expertise blending creativity and artistry with more tangible factors, such as research, data analysis, and industry trends. Driven to produce precise articles, biographies, reports, and profiles. The boys and Kimberly talk about everything from Quantum Research International to how we got started on "The Smalls". We all sit down right after the Rocky Mountain Cyber Symposium. To read the SIGNAL Magazine check it out here: https://www.afcea.org/content/?q=signal# To find out more about the Smalls or become a member, please check us out at www.thesmalls.org To contact Just Nate: justnate@thesmalls.org — Send in a voice message: https://anchor.fm/thesmalls/message Support this podcast: https://anchor.fm/thesmalls/support www.patreon.com/thesmalls --- Send in a voice message: https://anchor.fm/thesmalls/message Support this podcast: https://anchor.fm/thesmalls/support
Christy Hollywood (CP APMP) leads Hollywood & Associates, providing strategy, capture, and proposal advisory services. Christy Roach Hollywood, CP APMP, brings 25 years of capture-related experience in federal and commercial markets. Previously, Christy led and oversaw capture teams at KPMG, RTI International, Noblis, Cardno International Development, and PATH. A long-time APMP member, she also participates in the Strategy and Competitive Intelligence Professionals (SCIP), AFCEA, and Project Management Institute. Christy holds a BA from University of Virginia and an MBA (strategy concentration) from University of North Carolina-Chapel Hill.Support the show (https://pod.fan/scribble-talk)
Wer kennt es nicht? Man fährt morgens zur Arbeit, hat viele Termine und der Tag müsste eigentlich 25 Stunden haben, damit man die ganze Arbeit erledigen kann. Doch es ist wichtig zu wissen, wann man aufhören muss zu arbeiten und wann man anfangen muss sich zu entspannen. Marianna Schwarz, Innovation & Technology Engagement Manager bei der BWI GmbH und Vorstandsmitglied bei der AFCEA, erzählt im Interview wie sie ihre Arbeit, ihre Familie und ihre Freizeit balanciert und gibt Tipps, wie man eine gute Work-Life-Balance erreicht.
Anyone who thinks they've got cybersecurity chops can prove it in an upcoming challenge competition. Sponsored by Microsoft, the challenge is hosted by AFCEA and the Intelligence and National Security Alliance -- INSA. You'll have to hurry, this year as Emerging Professionals in the Intelligence Community, or EPIC, launches in just days. Federal Drive with Tom Temin got details from Microsoft Federal Senior Account Executive Niloo Norton, and Account Technology Strategist Joel Day.
Mettle of Honor: Veteran Stories of Personal Strength, Courage, and Perseverance
LTC Olivia J. Nunn (Washington DC-Baltimore Area) |Senior Marketing Manager | Social Media Strategist | Podcast Host | Diversity, Inclusion & Equality | Public Speaker | Veteran Affairs Experienced Director Of Communication with a demonstrated history of working in the government relations industry. Skilled in developing, executing, and assessing strategic communication, crisis communications, social media, media relations, and operations management. Strong media and communication professional with a master's degree focused on Public Relations & Corporate Communications from Georgetown University. Lieutenant Colonel Olivia Nunn commissioned as an ROTC Military Graduate through Radford University ROTC program in 2001. LTC Nunn has served in command and staff positions within the United States Army, including three combat deployments to Iraq. LTC Nunn developed the United States Military Academy at West Point's social media presence and redesigned the Academy's website while assigned to the academy. LTC Nunn was responsible for developing and mentoring cadets as an assistant triathlon coach of the West Point Triathlon Team. LTC Nunn has served as an official Army spokesperson, lead Strategic Communication Planner, and Executive Officer to the Chief of Army Public Affairs. She assumed duties as the Director of Communication, Soldier for Life in September 2018. LTC Nunn also serves as the Podcast Host for the U.S. Army Soldier for Life podcast series, the lead for Women Initiatives, Diversity, and Inclusion, and social media manager. LTC Nunn's awards and decorations include the Bronze Star Medal, Meritorious Service Medal, Army Commendation Medal, Army Achievement Medal, National Defense Service Medal, Iraq Campaign Medal with three Campaign Stars, Global War on Terror Expeditionary Medal, Global War on Terror Service Medal, Military Outstanding Volunteer Service Medal, Army Service Ribbon, Army Overseas Ribbon, Meritorious Unit Citation, and the Army Staff Identification Badge. LTC Nunn holds a Bachelor of Business Administration in Management from Radford University, Radford, VA, a Master of Science in Environmental Management from Webster University, and a Master of Professional Studies in Public Relations and Corporate Communications from Georgetown University. She is a graduate of the Command and General Staff College, the Joint Intermediate Public Affairs Course, the Public Affairs Qualification Course, the Chemical Officer Career Course, and the Chemical Officer Basic Course. LinkedIn Profile https://www.linkedin.com/in/olivia-j-nunn/ | Soldier for Life |soldierforlife.army.mil | S2 Analytical Solutions https://s2analyticalsolutions.com/ | AFCEA https://www.afcea.org/site/ (Armed Forces Communications & Electronics Association) --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/mettle-of-honor/message Support this podcast: https://anchor.fm/mettle-of-honor/support
Josh Datko, Founder of Cryptotronix, is our feature guest this week and are interviewed by Jason Jaques. News from Outrider, Velocity Global, Cloudrise, Red Canary, Coalfire, Lares and a lot more! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week’s news: Join the Colorado = Security Slack channel Denver's Coors Field will host MLB All-Star game Colorado is on track to take its most significant step toward a Front Range passenger train system Outrider and Rite-Hite partner to accelerate the adoption of yard automation With $100M funding and acquisition, Denver's Velocity Global prepares to hit $1B in revenue Cloudrise moves HQ to Grand Junction Data privacy bill could affect consumer-facing companies across Colorado Meet the Winners of AFCEA’s Rocky Mountain Cyberspace Symposium Capture the Flag Automatically block IPs and domains with Red Canary + Microsoft Waking up to the new realities of privacy risk and the need for focused expertise Emails and Malicious Macros - What Can Go Wrong? Job Openings: Holland & Hart - CISO Lunchbox - VP of Infrastructure and Security Alteryx - Manager, Cyber Security Operations Nutanix - Manager, Security Engineering CommonSpirit Health - Privacy Info Security Analyst II Workiva - Cyber Security Compliance Engineer RingCentral - Security Engineer Red Canary - Information Security Specialist Redwood Trust - Information Security Analyst McAfee - Sales Engineer - West Upcoming Events: This Week and Next: CTA - COLORADO PRIVACY ACT WEBINAR - 4/13 ISSA Denver - April Chapter Meeting - 4/14 ASIS - WIS : COFFEE CHAT WITH KATIE JUMP - 4/15 Put the "Sec" in DevOps - Security's role in Software Quality - 4/16 ISSA C.Springs - April Meeting - 4/20 CSA - April Meeting - 4/20 ISSA COS Cyberfocus Days - 4/20-22 OWASP - April Meeting - 4/21 ISACA Denver - April General Meeting - 4/21-23 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
In today's Federal Newscast, two large government conference organizers say the third party vendor they use for conference registration was the victim of a ransomware attack.
Exchange Server patching is going well, they say, but they also say that patching isn’t enough. Crooks are continuing to look for unpatched instances, and even in the patched systems, you’ve got to check to make sure the bad actors have been found and ejected. AFCEA and Shell both disclose being affected by third-party breaches. Citizen Lab sees no particular problem with TikTok. Ben Yelin ponders possible US response to the Microsoft Exchange Server attacks. Our guest is Alex Gizis from Connectify using VPNs to thwart government internet restrictions in Myanmar. And a major manga fan site is down. For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/10/55
This is a special 90-minute bonus episode of the Cognitive Crucible. On October 29th 2020, IPA and AFCEA's ALAMO Chapter co-hosted a Virtual Panel on Combatting Disinformation in a Competitive Information Environment. The star-studded panel of senior government personnel and thought leaders spotlights the current pivot toward a convergence approach to improve our competitive advantage across the strategic and operational environments, most specifically in the cyber-enabled information space. The event slide deck is available here. Across the National and Defense enterprise, agencies and organizations are reprioritizing and reorganizing to more effectively compete in a competitive and complex global information environment. The Nation is being increasingly impacted by cutting-edge technology and sophisticated influence activities to shape perceptions, decisions and behavior. The discussion is framed by the recently released Defense Science Board study regarding global competition in the information environment, includes ongoing efforts, and as well as new initiatives to support USG and DOD priorities in cognitive security such establishing a Cognitive Security Proving Ground, re-establishing the Phoenix Challenge information operations conference series, and discussion of the newly-established Principal Information Operations Advisor to the Secretary of Defense. Moderated by Mr. Austin Branch; the star-studded panelists are: Ms. Lynne Patrick, Technical Director at Sixteenth Air Force Joint Base San Antonio Dr. Brian Pierce, Visiting Research Scientist at the Applied Research Laboratory for Intelligence and Security (ARLIS) LTG (RET.) Ed Cardon, Former Commander of US Army Cyber Command, and Commander JTF ARES Mr. Rob “Bus” Bussian, Director for Cyber and Strategic Enabling in the Concepts, Development and Management Office under the Administrative Assistant to the Secretary of the Air Force Mr. Bob Pearson, Social media expert, author, professor, digital consultant Mr. Joe Kelly, Applied Research Lab for Intelligence and Security and President of Pointweaver, LLC For more information, please contact us at communications@information-professionals.org. Or, you can connect directly with The Cognitive Crucible podcast host, John Bicknell on LinkedIn.
Sit down with Christopher Gorog as he interviews Gretchen Bliss, director of Cybersecurity programs at UCCS. They discuss campuswide cyber strategy, including program components involved and how it affects events, as well as the building of NCC and Space ISAC. Listen and join in on the conversation! This episode is brought to you by UCCS Cybersecurity at UCCS is expanding and growing. In addition to the long-standing Certificate, Bachelor’s Masters and PhD Cybersecurity programs in Engineering, new programs have launched in the College of Business focused on Cybersecurity Management. UCCS is working with industry, government and other educational institutions across the country to create pathways to fill the overwhelming need for cybersecurity professionals. Just this fall, UCCS partnered with AFCEA and the National Cyber League on the Pikes Peak Cyber Challenge where USAFA, PPCC and UCCS Cyber teams competed. On 13 November UCCS is hosting an “Ethics in Cybersecurity” virtual event and welcome anyone to attend (register at https://cvent.me/MQAq5b). On December 5, this competition is expanding across the region in partnership with AFCEA and Deloitte for the Rocky Mountain Cyber Challenge where 30 teams of 5 students from colleges and universities in CO, UT, NM and WY can register to compete for great prizes. (register here https://www.eventsquid.com/event/11072) In addition to events, UCCS is receiving grants as well to develop programs to support the exponentially growing demand for a large cybersecurity workforce. UCCS College of Business was granted $6M from the Department of Labor to establish a Cybersecurity Apprenticeship Program. UCCS is also the designated Hub for the Northwest Region for the National Security Agency Center of Academic Excellence Program expanding a ecosystem of cybersecurity education from K-12 through Post Doctorate. Visit our sponsors: Cyber Resilience Institute BlockFrame Inc. SecureSet Academy Murray Security Services
Co-host Benny White - Guests: Rich Fly with AFCEA and Alain Espinosa with INFRAGARD
First up we have Sanford Ching, Director of AFCEA, and he’s here to tell us about AFCEA’s STEM grants. Then we have Alec Wagner, Director of Purple Prize and Kilo Hoku, Preston Tran, co-founder of Box Farm Labs and Joshua Parker recently won the Kipuka Innovation Challenge with Hawaiian Hydropower, talk about native culture and … Continue reading "Episode 630: AFCEA STEM Grants + Purple Maia – Sept 23, 2020"
First up we have Mary Smith from Hawaii Pacific University and AFCEA, here to tell us about the Merit Scholarship Award Applications. The application due date is July 31, 2020. Then we’re joined by Brandon Kurisu from Upspring Media and Michael Kamida from Nuix to talk about using Aloha Trace, Safe Path and contact tracing. … Continue reading "Episode 617: AHEF Scholarships + Aloha Trace & Safe Path – June 24, 2020"
Carl Dickson is the founder of CapturePlanning.com and PropLIBRARY. Carl is a proposal manager, writer, trainer, and coach. A career spanning 30 years, Carl has published over a thousand articles, whitepapers, books, and training materials. The articles he publishes reach over 100,000 professionals every week and over 7 million professionals have visited his websites.As a speaker, Carl has presented at conferences and events sponsored by (APMP); Society for Marketing Professional Services; Marketing Research Association; Armed Forces Communications and Electronics Assoc. (AFCEA); FOSE; Deltek; Fairfax County Community Business Partnership; Government Contracting Institute; and the Washington DC Office of Contracting and Procurement.
In this episode, the smalls CEO and COO interview the Rocky Mountain AFCEA Chapter President, Lt Col Vanessa Johnson, USAF (ret). Vanessa explains the purpose of AFCEA and what there Rocky Mountain Chapter is trying to accomplish in the community. New events, expansion and even future happy hours are discussed. The best quote in this episode is "Your Net-worth is only as good as your Network". Listen in as your host Just Nate and Dennis pull on this thread a bit. For more information on the Rocky Mountain AFCEA chapter or how to become a member, please visit there website at: https://www.afcearockymtn.org/ Don't forget for more content, events and everything to do with the small business ecosystem visit our website at: https://thesmalls.org/ --- Send in a voice message: https://anchor.fm/thesmalls/message Support this podcast: https://anchor.fm/thesmalls/support
Few, if any, are left at the U.S. Citizenship and Immigration Service’s security operations center who just stare at screens looking for cyber anomalies. Instead of using people, USCIS automated those basic functions in order to free up valuable people to work on more complex cybersecurity challenge. Shane Barney, the chief information security officer at USCIS at the Department of Homeland Security, and Togi Andrews, the CISO at FEMA, joined Federal News Network Executive Editor Jason Miller for a panel during the recent AFCEA Bethesda breakfast to discuss the issue. Hear more on Ask the CIO.
Eric Strauss, Tan Wilson and Elizabeth Moon, members of AFCEA's small business committe, join host Mark Amtower on this week's Amtower Off Center, to discuss the committee's mission, goals, and its plans for 2020.
In this episode of #IMM, Christine chats with Bob Ackerman, George Seffers and Kim Underwood of Signal Magazine/AFCEA.
It was a busy week for interviews at Technado. First, Pradeo’s CTO Vivien Raoul warned the team about an Android app that was collecting more data than it should. Next, The EVP of the Fort Knox Gold Vault Chapter of AFCEA Kathryn Thompson joined to talk about AFCEA’s efforts for diversity and inclusion. Finally, Bandura Cyber’s CSO Todd Weller explained the importance of threat intelligence-driven network security.
It was a busy week for interviews at Technado. First, Pradeo’s CTO Vivien Raoul warned the team about an Android app that was collecting more data than it should. Next, The EVP of the Fort Knox Gold Vault Chapter of AFCEA Kathryn Thompson joined to talk about AFCEA’s efforts for diversity and inclusion. Finally, Bandura Cyber’s CSO Todd Weller explained the importance of threat intelligence-driven network security.
It was a busy week for interviews at Technado. First, Pradeo’s CTO Vivien Raoul warned the team about an Android app that was collecting more data than it should. Next, The EVP of the Fort Knox Gold Vault Chapter of AFCEA Kathryn Thompson joined to talk about AFCEA’s efforts for diversity and inclusion. Finally, Bandura Cyber’s CSO Todd Weller explained the importance of threat intelligence-driven network security.
It was a busy week for interviews at Technado. First, Pradeo’s CTO Vivien Raoul warned the team about an Android app that was collecting more data than it should. Next, The EVP of the Fort Knox Gold Vault Chapter of AFCEA Kathryn Thompson joined to talk about AFCEA’s efforts for diversity and inclusion. Finally, Bandura Cyber’s CSO Todd Weller explained the importance of threat intelligence-driven network security.
It was a busy week for interviews at Technado. First, Pradeo’s CTO Vivien Raoul warned the team about an Android app that was collecting more data than it should. Next, The EVP of the Fort Knox Gold Vault Chapter of AFCEA Kathryn Thompson joined to talk about AFCEA’s efforts for diversity and inclusion. Finally, Bandura Cyber’s CSO Todd Weller explained the importance of threat intelligence-driven network security.
It was a busy week for interviews at Technado. First, Pradeo’s CTO Vivien Raoul warned the team about an Android app that was collecting more data than it should. Next, The EVP of the Fort Knox Gold Vault Chapter of AFCEA Kathryn Thompson joined to talk about AFCEA’s efforts for diversity and inclusion. Finally, Bandura Cyber’s CSO Todd Weller explained the importance of threat intelligence-driven network security.
Gordon Bitko, the chief information officer of the FBI, said the bureau is relaying on a combination of tools, training and shared services to better manage data.
Big thanks to Katie Helwig, Director, Small Business Programs, AFCEA International talks The Sharing Economy Getting Involved and; Doing business with the Government as a Veteran or Military Spouse owned business Check out www.afcea.org for more information on their July Small Business Innovation Event.
This week on Amtower Off Center, host Mark Amtower talks about some of the big issues facing small contractors with Elizabeth Moon, AFCEA's Small Business program Manager, USmax Corp. President and CEO David Pak, and Eric Strauss, director of Business Development at Connected Logistics.
Sales Game Changers | Tip-Filled Conversations with Sales Leaders About Their Successful Careers
Read the complete transcript on the Sales Game Changers Podcast website. Nathan Jones is the Vice President of Federal at Red Hat and was one of the first sales reps hired by Red Hat. Before that, he had sales roles at Mercury Interactive and EMC. He's the president of the AFCEA, Washington DC chapter.
What is the value of face-to-face networking and how can AFCEA help in that effort? Find out when Katie Helwig, director of Small Business Programs at AFCEA, and Eric Strauss, director of Business Development for Connected Logistics, joins host Mark Amtower on this week’s Amtower Off Center.
Sales Game Changers | Tip-Filled Conversations with Sales Leaders About Their Successful Careers
Read the complete transcript to this podcast on the Sales Game Changers Podcast website. Gary Newgaard is the Vice President for Public Sector for Pure Storage. Gary was previously the vice president of public sector hardware sales for Oracle in North America. Prior to joining Oracle he served in senior level positions at PIXIA, EMC and Compaq, leading results driven sales divisions with consistent revenue growth. He has also been successful as an entrepreneur building startup organizations such as Paragon Systems and Intelligent Enterprise Solutions. He's a multiple recipient of Federal Computer Week's Fed 100 award and the industry advisory council's prestigious Communications award. He's also a long standing member of AFCEA's board of directors. Find Gary on LinkedIN!
Delali Dzirasa is Founder and President of Fearless Solutions, a software firm based out of Baltimore, MD. Delali is a Certified Scrum Master and PMP® with a decade of experience leading agile software teams and programs. . Delali Dzirasa graduated with a B.S. in Computer Engineering from the University Maryland, Baltimore County (UMBC) in 2004. Delali always had a passion for entrepreneurship and after working at a handful of technology firms, he founded Fearless in 2009. Fearless is a company driven by delivering innovative products and services to our customers that make a difference. Delali strives to make a difference in technology as well as his surrounding community. He serves as a Board Member on the UMBC Computer Science and Electrical Engineering Visiting Committee and an active volunteer and member of the Central Maryland Chapter of AFCEA. He currently resides with his wife and son in Baltimore City, where he is passionate about increasing the rate of city youth heading into STEM based fields. When Delali isn’t busy running Fearless (rarely), he enjoys working out and hanging out with friends and family. He can be reached at delalid@fearsol.com.
This week on Dave and Gunnar: Oracle plays with science, Amazon plays with the US Postal Service, and everyone plays with tracking you like a criminal. Subscribe via RSS or iTunes. FLIGHTMARE! Inflight cell calling debuts, dealing heavy blow to quality of life U.S. Reaches Preliminary Deal in American-US Airways Merger Lawsuit Adam Clater will soon be able to recharge his beard phone and guinea pig with microwaves HT Jason Calloway: Beard followup badBIOS and more apocalyptic movie plot ideas, part III: Russia: Hidden chips ‘launch spam attacks from irons’ Sorry state of baseband OSes Larry Ellison misunderstands science and economics Amazon Is Closer Than Ever to Running the U.S. Postal Service Did your Adobe password leak? Now you and 150m others can check Anatomy of a password disaster – Adobe’s giant-sized cryptographic blunder Facebook makes Adobe fans change their horrible, horrible passwords How stores use your phone’s WiFi to track your shopping habits Attention, Shoppers: Store Is Tracking Your Cell Google Is Testing A Program That Tracks You Everywhere You Go You Are a Rogue Device: A New Apparatus Capable of Spying on You Has Been Installed Throughout Downtown Seattle. Very Few Citizens Know What It Is, and Officials Don’t Want to Talk About It. Google updates Google+ Hangouts updated… for one tap location sharing More good news: Facebook patented making government data handoffs easier Toronto tailor introduces bulletproof three-piece suits Dave at SC13 in Denver November 17-22 Gunnar to deliver Ironman 90 minute keynote Alamo ACE (AFCEA) in San Antonio on November 19-20 OpenShift’s everyday low prices: Announcing 50% Lower Gear Prices, More Countries, and 2GB Gears in the Silver Plan Happy 10th birthday Fedora! SELinux coloring book HT Tony James: Automated auditing the system using SCAP Rapport with panelists is more important than knowing what you’re going to say Bonus tips: Confessions of a Public Speaker Cutting Room Floor HT Nathan: Boston Symphony mourns JFK The 1960s Superhero Who Was Powered by Smoking Awesome: Vocals only version of Happy Together by The Turtles And lots more including Alice in Chains, 11 yo Michael Jackson, Beatles, and Dire Straits! Universal Translator? Turn your Raspberry Pi into a Translator with Speech Recognition and Playback 39 Raspberry Pi 3D Scanner The Automata of Terror: Cinema’s 8 Scariest Robots Cognitive surplus: London Underground Simulator game review Related: New York Bus: The Simulation Goodwill Computer Museum in Austin, TX! And if you are near Bletchley Park check out The National Museum of Computing And if you are near Fort Meade check out The National Cryptologic Museum We Give Thanks Jason Calloway, Tony James, and Nathan for giving us ideas to talk about!
This week, Dave and Gunnar talk about badBIOS and unreliable narrators, 85% of Android is crap, warrant canaries, and special guest star Adam Clater talking about OpenShift and ownCloud Subscribe via RSS or iTunes. badBIOS disputed Analysis is wrong Researcher skepticism Almost related: Motorola wants you to tattoo a smartphone microphone onto your throat Cloud to Butt 2.0: xkcd substitutions Chrome extension Risk Walking Dead Survival Edition Gunnar is enjoying his Nexus 5 and its inability to receive email using client certificates Protect your Android phone by getting rid of its crapware Power Plants and Other Vital Systems Are Totally Exposed on the Internet Google aims to replace car dashboard buttons with Minority Report hand gestures Frenzy Is a Private, Dropbox-Powered Social Network A Red Hat Solutions Architect Manager We Like: Adam Clater because he tells us about OwnCloud on OpenShift Red Hat Government Symposium was outstanding. A bunch of great announcements from CFPB, DOE, and ODNI! D&G Show video edition! Challenges in the cloud How does PaaS differ from IaaS? Why is PaaS better for managers? How PaaS changes the way developers work co-starring Bob Kozdemba Red Hat Summit CFP extended to November 19 for customers and partners Red Hat Innovation Awards nominations open until December 13 Dave will be at Supercomputing 2013 November 17-22 Gunnar will be at JBoss Day in Austin on November 12 C5ISR Summit in Charleston on November 13 Alamo ACE (AFCEA) in San Antonio on November 19 Word of the Week: “Warrant Canary” Apple just used one. How to mostly dial with Google Voice with a correct call log for later Hadoop analysis Voice Plus GV Outbound Call Log Repair CallTrack logs to your calendar Hadoop 10 Tips for an Awesome Coffee Meeting Cutting Room Floor HT Noel Weichbrodt: More hipster than you: the carbon-fiber penny farthing Why we should get rid of Daylight Savings Time The most terrifying reading of Goodnight Moon you’ll ever hear Grave markers embedded in airport runway Nine worst doctored photos of Chinese officials We Give Thanks Adam Clater for guest starring! Gunnar’s mom for teaching us about warrant canaries
This week, Dave and Gunnar talk about alien invasion, BIOS invasion, privacy invasion, and invasion of common sense at FAA. Subscribe via RSS or iTunes. He’s a macaroni. History of Rome is amazing. Check out Revolutions! Gunnar bait of the other week, part 2 Deep Brain Stimulation stimulator goes somewhere other than your head and the leads go in your brain — don’t let some fly by night surgeon tell you otherwise Remember the Milk is forgetting to Remember the Customers: Andrew @ Remember The Milk OCT 29, 2013 | 08:56PM EDT Hi Gunnar, Thanks for your feedback! I'll make sure that the development team gets your thoughts for review. Feedback is very important to us, and we review feature requests on a regular basis as we work to improve Remember The Milk. If you're interested in Remember The Milk news, please keep an eye on our blog for any future announcements: http://blog.rememberthemilk.com/ Or, follow us on Twitter: http://twitter.com/rememberthemilk If there's anything else I can help you with, please let me know. New FAA Guidelines Permit More Device Use, All The Way From Take-Off To Landing Also, TSA pre-crime Book of the week: The New Kingmakers: How Developers Conquered the World http://resume.github.io can build an objective git-powered resume for any GitHub user Re-read Garann Means’ Meritocracy rant HT Travis Kepley: Cloud-to-Butt Chrome extension HT Kelsey D. Atherton: How We Killed Privacy — in 4 Easy Steps: Stop blaming the NSA. We did this to ourselves. Related: Former spy chief overheard giving off-the-record interview from Acela train War of the Worlds radio broadcast was 75 years ago Local (Akron) perspective Let’s ask Wikipedia Spooky news for Halloween: Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Thoughts on Intel’s upcoming Software Guard Extensions (Part 2) Red Hat Summit Call for Proposals closes November 5 Red Hat Government Symposium is on for November 6! JBoss Day in Austin on November 12 C5ISR Summit in Charleston on November 13 Alamo ACE (AFCEA) in San Antonio on November 19 Origin of the word dude Deconstructing Led Zeppelin’s Classic Song ‘Ramble On’ Track by Track: Guitars, Bass, Drums & Vocals Cutting Room Floor Baby Carrots: A BAG OF LIES How Reid Hoffman pitched LinkedIn, an annotated deck AT&T Corporate. Video about. UNIX. 19th century 9 lb multitool with pistol We Give Thanks Matt Micene as usual Travis Kepley Shawn Wells, for being the AV guy Jennifer of US Airways for carrying Dave’s library book through the airport
This week, Dave and Gunnar talk about: turning people into products, patches into pounds and pence, protecting poultry, priorities, primary patchers on projects, and PDFs into poison. Subscribe via RSS or iTunes. How do you say “infringement” in Farsi? Gunnar: There’s an app for that HT @CampCatastrophe: Deep Brain Stimulation implant “about the size of a stopwatch” Almost related: LG jumps on the vestibulo-ocular reflex chicken powered steady cam bandwagon Not related: Chicken safety vest HT Keenan: First Amendment expert Eugene Volokh on Sufficient Speech vs. Facebook HT Matt Micene: If you use Google services, you could become an ad next month Step 1: Opt out here Step 2: Enable Adblock Plus or Adblock Edge Moral of the story: don’t get Scroogled. At least Microsoft isn’t doing creepy tracking. Oh wait, never mind. LinkedIn makes hacker’s dreams come true State Decoded has the SCAP Security Guide baked in! HT Mil-OSS: Google Offers New Bounty Program For Securing Open-Source Software News Flash: Oracle Still Hates Open Source Software Mil-OSS weighs in Nominations Now Open for 2014 Red Hat Innovation Awards Red Hat Summit Call for Proposals closes November 5 Red Hat Government Symposium is on for November 6! JBoss Day in Austin on November 12 C5ISR Summit in Charleston on November 13 Alamo ACE (AFCEA) in San Antonio on November 19 Cantas = open source Trello Matt Micene and Dave celebrate National Cybersecurity Awareness Month with a blog post RHEL 5.9 to 5.10 risk report Measure it yourself RIP acroread OpenStack Havana is out! Activity dashboard RHEV 3.3 beta has OpenStack goodness too HT Yasir Syeed: OpenStack threatens Paas? Customers and partners we like Emergent and Red Hat Announce Cloud Collaboration Around OpenShift PaaS The Navy’s newest warship is powered by Linux The Eisenhower Matrix The Ten Most Expensive Vehicles To Operate Cutting Room Floor Pizza Hat HUD for your car Raspberry Pi internet controlled whoopie cushion Build your own Arduino powered Enigma machine Open source HTML5 Full Screen Mario Run Linux on an emulated MIPS processor… in your browser w/JavaScript! (Securely?) Boot to Zork using UEFI A Klingon Christmas Carol performed in the original Klingon with English supertitles and narrative analysis from the Vulcan Institute of Cultural Anthropology Jim Henson’s Muppet Computer from 1963 The scientific proof why Dave is addicted to Nacho Cheese Doritos 27 Actors Who Got Their Starts on Miami Vice We Give Thanks @CampCatastrophe, Keenan, Matt Micene, Mil-OSS, and Yasir Syeed for encouraging us by giving us items to discuss!
Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Data mining has many ap-plications in security including for national security as well as for cyber security. The threats to national security include attacking buildings, destroying critical infrastructures such as power grids and telecom-munication systems. Data mining techniques are being investigated to find out who the suspicious people are and who is capable of carrying out terrorist activities. Cyber security is involved with protecting the computer and network systems against corruption due to Trojan horses, worms and viruses. Data mining is also being applied to provide solutions such as intrusion detection and auditing. The first part of the presentation will discuss my joint research with Prof. Latifur Khan and our students at the University of Texas at Dallas on data mining for cyber security applications For example; anomaly detection techniques could be used to detect unusual patterns and behaviors. Link analysis may be used to trace the viruses to the perpetrators. Classification may be used to group various cyber attacks and then use the profiles to detect an attack when it occurs. Prediction may be used to determine potential future attacks depending in a way on information learnt about terrorists through email and phone conversations. Data mining is also being applied for intrusion detection and auditing. Other applications include data mining for malicious code detection such as worm detection and managing firewall policies.This second part of the presentation will discuss the various types of threats to national security and de-scribe data mining techniques for handling such threats. Threats include non real-time threats and real-time threats. We need to understand the types of threats and also gather good data to carry out mining and obtain useful results. The challenge is to reduce false positives and false negatives. The third part of the presentation will discuss some of the research challenges. We need some form of real-time data mining, that is, the results have to be generated in real-time, we also need to build models in real-time for real-time intrusion detection. Data mining is also being applied for credit card fraud de-tection and biometrics related applications. While some progress has been made on topics such as stream data mining, there is still a lot of work to be done here. Another challenge is to mine multimedia data including surveillance video. Finally, we need to maintain the privacy of individuals. Much research has been carried out on privacy preserving data mining. In summary, the presentation will provide an overview of data mining, the various types of threats and then discuss the applications of data mining for malicious code detection and cyber security. Then we will discuss the consequences to privacy. About the speaker: Dr. Bhavani Thuraisingham joined The University of Texas at Dallas in October 2004 as a Professor of Computer Science and Director of the Cyber Security Research Center in the Erik Jonsson School of Engineering and Computer Science. She is an elected Fellow of three professional organizations: the IEEE (Institute for Electrical and Electronics Engineers), the AAAS (American Association for the Advancement of Science) and the BCS (British Computer Society) for her work in data security. She received the IEEE Computer Society's prestigious 1997 Technical Achievement Award for "outstanding and innovative contributions to secure data management."Dr Thuraisingham's work in information security and information management has resulted in over 70 journal articles, over 200 refereed conference papers and workshops, and three US patents. She is the au-thor of seven books in data management, data mining and data security including one on data mining for counter-terrorism and another on Database and Applications Security and is completing her eighth book on Trustworthy Semantic Web. She has given over 30 keynote presentations at various technical confer-ences and has also given invited talks at the White House Office of Science and Technology Policy and at the United Nations on Data Mining for counter-terrorism. She serves (or has served) on editorial boards of leading research and industry journals and currently serves as the Editor in Chief of Computer Stan-dards and Interfaces Journal. She is also an Instructor at AFCEA's (Armed Forces Communications and Electronics Association) Professional Development Center and has served on panels for the Air Force Scientific Advisory Board and the National Academy of Sciences. Dr Thuraisingham is the Founding President of "Bhavani Security Consulting" - a company providing services in consulting and training in Cyber Security and Information TechnologyPrior to joining UTD, Thuraisingham was an IPA (Intergovernmental Personnel Act) at the National Sci-ence Foundation from the MITRE Corporation. At NSF she established the Data and Applications Secu-rity Program and co-founded the Cyber Trust theme and was involved in inter-agency activities in data mining for counter-terrorism. She has been at MITRE since January 1989 and has worked in MITRE's Information Security Center and was later a department head in Data and Information Management as well as Chief Scientist in Data Management. She has served as an expert consultant in information secu-rity and data management to the Department of Defense, the Department of Treasury and the Intelligence Community for over 10 years. Thuraisingham's industry experience includes six years of research and development at Control Data Corporation and Honeywell Inc. Thuraisingham was educated in the United Kingdom both at the University of Bristol and at the Univer-sity of Wales.