Search for tag: "security"

Defense Cloud Computing-Security-DISA-Part 3 Nov. 2013

David Bennett: Take that is absolutely on target.…

+9 More
From  Kevin Jackson 21 plays 0  

Cybersecurity-Progress-DHS-Jan. 14

Brendan Goode: In particular I see it as an era…

+9 More
From  Kevin Jackson 11 plays 0  

Cybersecurity-Vision-DHS-Jan. 14

Brendan Goode: Certainly the threat doesn’t…

+9 More
From  Kevin Jackson 22 plays 0  

Cybersecurity-Programs-DHS-Jan. 14

Brendan Goode: That's a tough question,…

+9 More
From  Kevin Jackson 38 plays 0  

DHS-Cybersecurity-Priorities-Jan. 14

Brendan Goode: Sure. First of all, it’s…

+9 More
From  Kevin Jackson 13 plays 0  

Cybersecurity-Challenges-DHS-Jan. 14

Brendan Goode: Sure. Cybersecurity is a problem…

+9 More
From  Kevin Jackson 12 plays 0  

FEF-Virt-DCC-Viewing Security-US Army-April 2014

+7 More
From  Kevin Jackson 1 plays 0  

FEF-Virt-DCC-Viewing Security-US Air Force-April 2014

+8 More
From  Kevin Jackson 2 plays 0  

Continuous Monitoring-Profiles-DHS-June 2014

John Streufert: I appreciate Rod bringing that…

+8 More
From  Kevin Jackson 2 plays 0  

Continuous Monitoring-Progress-DHS Part 3-June 2014

John Streufert: Well, Jim, I’d like to…

+8 More
From  Kevin Jackson 2 plays 0  

FEF-Continuous Monitoring-Lessons Learned-DHS-June 2014

From  Kevin Jackson 2 plays 0  

FEF-Secure Cloud Computing-Security-NGA #3-May 2014

+8 More
From  Kevin Jackson 8 plays 0  

Secure Cloud Computing-Security-Labor-May 2014

Dawn Leaf: So, I think I’d like to add a…

+7 More
From  Kevin Jackson 3 plays 0  

Secure Cloud Computing-Security-Army-May 2014

Ltc Paul Stanton: Yes, sir. It’s a huge…

+9 More
From  Kevin Jackson 13 plays 0  

Defense Cloud Computing-Security-US Army-Nov. 2013

Gary Blohm: When we went to enterprise email and…

+11 More
From  Kevin Jackson 3 plays 0  

Defense Cloud Computing-Security-Air Force-Nov. 2013

Frank Konieczny: We are addressing it in a very…

+9 More
From  Kevin Jackson 1 plays 0