63 subscribers
با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده
Three Federal Government/DoD Cloud Transition Issues and How to Prevent Them
Manage episode 239464329 series 1264075
In 2011, the Office of Management and Budget (OMB) issued the “Cloud First” policy to reform federal information technology management, which required agencies to evaluate cloud computing options. In 2012, the DoD Cloud Computing Strategy evolved to identify the most effective ways for the department to capitalize on opportunities and take advantage of cloud computing benefits that accelerate IT delivery, efficiency, and innovation as an enterprise. In the years since, many cloud transition efforts in both federal agencies and the DoD have experienced significant issues. This webinar will address a few of the causes for the transition issues, as well as identify some practices that will assist organizations as they plan to transition assets and capabilities to the cloud. The webinar will wrap up with a brief discussion of the 2019 Federal Cloud Computing Strategy – Cloud Smart, an updated cloud policy to improve cloud adoption for federal agencies developed by OMB.
169 قسمت
Manage episode 239464329 series 1264075
In 2011, the Office of Management and Budget (OMB) issued the “Cloud First” policy to reform federal information technology management, which required agencies to evaluate cloud computing options. In 2012, the DoD Cloud Computing Strategy evolved to identify the most effective ways for the department to capitalize on opportunities and take advantage of cloud computing benefits that accelerate IT delivery, efficiency, and innovation as an enterprise. In the years since, many cloud transition efforts in both federal agencies and the DoD have experienced significant issues. This webinar will address a few of the causes for the transition issues, as well as identify some practices that will assist organizations as they plan to transition assets and capabilities to the cloud. The webinar will wrap up with a brief discussion of the 2019 Federal Cloud Computing Strategy – Cloud Smart, an updated cloud policy to improve cloud adoption for federal agencies developed by OMB.
169 قسمت
همه قسمت ها
×
1 Identifying AI Talent for the DoD Workforce 1:01:42

1 Model Your Way to Better Cybersecurity 1:02:54

1 DevSecOps: See, Use, Succeed 1:00:41

1 An Introduction to the MLOps Tool Evaluation Rubric 1:00:23



1 A New Performance Zone for Software for National Security 1:02:23









1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05


1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22


1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10


1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03



1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36

1 Improving Analytics Using Enriched Network Flow Data 1:02:25

1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01

1 AI Next Generation Architecture 1:01:44

1 Addressing Supply Chain Risk and Resilience for Software-Reliant Systems 1:01:31


1 Finding Your Way with Software Engineering Buzzwords 1:01:38




1 Exploring an AI Engineering Body of Knowledge 1:02:21

1 What are Deepfakes, and How Can We Detect Them? 1:00:00

1 Adapting Agile and DevSecOps to Improve Non-Software Development Teams 1:03:07


1 Ask Us Anything: Zero Trust Edition 1:02:27





1 The Future of AI: Scaling AI Through AI Engineering 1:01:59

1 AI Engineering: Ask Us Anything About Building AI Better 1:04:47

1 Balanced Approaches to Insider Risk Management 1:00:53

1 Software Development Open Forum: Ask Hasan Anything! 1:03:02

1 Software Supply Chain Concerns for DevSecOps Programs 1:03:47

1 How Do We Teach Cybersecurity? 1:00:17

1 Software Supply Chain Concerns for DevSecOps Programs 1:01:06

1 Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems 1:03:29

1 AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI 1:02:20

1 Amplifying Your Privacy Program: Strategies for Success 1:01:06

1 DevOps Enables Digital Engineering 1:00:44


1 SolarWinds Hack: Fallout, Recovery, and Prevention 1:01:18

1 Software Engineering for Machine Learning 1:03:11


1 What Is Cybersecurity Engineering and Why Do I Need It? 1:02:05

1 Threats for Machine Learning 1:01:23


1 Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks? 1:01:50

1 Quality Attribute Concerns for Microservices at the Edge 1:01:34



1 Solving Current Cyber Challenges: Academic and Industry Collaboration 1:02:33


1 A Discussion on DoD Software Advances and What’s Next from SEI 1:00:31

1 Top 5 Considerations Before Boarding the Container Ship 1:04:32

1 Trust, Verify & Authorize with DevSecOps 1:02:20





1 Becoming a Better Software Architect 1:02:01


1 Cyber Hygiene: Why the Fundamentals Matter 1:02:13

1 Insider Threats: Your Questions. Our Answers. 1:00:27






1 DevSecOps Implementation in the DoD: Barriers and Enablers 1:01:29

1 What Makes a Good Software Architect (2019 Edition)? 1:01:00

1 Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator 1:02:12

1 Improve Your Static Analysis Audits Using CERT SCALe 1:00:53

1 Blockchain: Your Questions. Our Answers. 1:01:26




1 How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate 1:04:38





1 Next Steps with Blockchain Technology 1:01:26

1 Five Ways to Boost Cybersecurity with DevOps 1:06:13

1 Three Software Innovations that DoD Needs Now 1:02:47


1 Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability 1:06:07

1 Is Software Spoiling Us? 1:00:56


1 Three Secrets to Successful Agile Metrics 1:24:16

1 Five Keys to Effective Agile Test Automation for Government Programs 1:29:54

1 The Evolving Role of the Chief Risk Officer 1:04:55

1 Practical Considerations in Adopting Agile-Lean in Government Settings 1:01:12



1 Building and Scaling a Malware Analysis System 1:02:28

1 How to Reduce the Graveyard of Software Tools with UI/UX Capability 1:04:57

1 From Secure Coding to Secure Software 1:04:20

1 Data Science: What It Is and How It Can Help Your Company 1:01:53

1 What Makes a Good Software Architect? 1:29:02

1 Intelligence Preparation for Operational Resilience 1:00:58

1 Structuring the Chief Information Security Officer Organization 1:02:52

1 Context Enabled Computing 1:01:36

1 Using Network Flow to Gain Cyber Situational Awareness 1:00:14

1 DevOps Security: Ignore It As Much As You Would Ignore Regular Security 1:03:47

1 A Taxonomy of Testing Types 1:03:59






1 Culture Shock: Unlocking DevOps with Collaboration and Communication 1:02:49



1 Responding to a Large-Scale Cybersecurity Incident 1:01:46




1 Advancing Cyber Intelligence Practices Through the SEI's Consortium 1:00:59


1 Lessons in External Dependency and Supply Chain Risk Management 1:27:53


1 Architecture Analysis with AADL 1:03:05


1 Heartbleed: Analysis, Thoughts, and Actions 1:31:52





به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.