Remove Implementation Remove Operations Remove Security
article thumbnail

Enhancing Federal AI Safety: Responsible and Secure AI Sandbox

Microsoft Public Sector

Who Should Read This This document will be beneficial to Federal Executives including Chief Information Officer, Chief Artificial Intelligence Officer, Chief Technology Officer, Chief Information Security Officer, Chief Data Officer, AI Lead, AI Scientist, and Data Scientist, among others.

Security 115
article thumbnail

How AI Could Revolutionize Cyber Operations

GovLoop

Adoption of AI has been widespread in recent years, touching every area of life because of its potential to improve operations. For government agencies’ cybersecurity operations, AI holds especially great promise. Where AI Can Help Imhof highlighted several uses for AI in cybersecurity operations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Small budget, strong security: Why Zero Trust is key to protecting critical infrastructure

American City & Country

Earlier this year, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Federal Bureau of Investigation (FBI) issued a joint advisory , warning government agencies of potential disruptions to U.S. Traditional security measures, reliant on perimeter defense, are no longer sufficient.

article thumbnail

Securing cloud applications in government’s multi-cloud world

American City & Country

Today, government IT teams find themselves navigating a labyrinth of security controls, compliance requirements, and risk management practices. As a result, by embracing a multi-cloud strategy, government agencies must also be prepared to address a series of operational and security challenges. But don’t stop there.

article thumbnail

Efficiency and Sustainability: Leveraging Digital Solutions in Facility Operations

Speaker: Alan Kavanaugh, BA, CRM, CCPI ​​​​​​​Director of Loss Control & Risk Management

Practical knowledge to effectively incorporate digital solutions for operational efficiency. Real-world case studies demonstrating successful implementations in small municipalities. Enhanced strategies to drive sustainability within facility operations.

article thumbnail

Microsoft Security Copilot and NIST 800-171

Microsoft Public Sector

Microsoft Security Copilot and NIST 800-171 It is with bated breath that we await the publication of a Proposed Rule and final draft of Cybersecurity Maturity Model Certification (CMMC) 2.0. Implementation and management of cybersecurity technology, to meet a regulatory requirement or not, has financial implications.

Security 144
article thumbnail

How to Manage Distributed Data Securely, Effectively

GovLoop

Data security may look a little different in a distributed environment, Hoon said, “and there are also scalability and storage challenges to deal with.” Implement zero-trust capabilities to verify and authenticate every request for data access.” Edge data can better support mission context and relevance.”