Remove Government Remove How To Remove Military Remove Study
article thumbnail

Introducing Films of State, a Conference on Government Films

Unwritten Record

Today I am thrilled to tell you about something we’ve been working on: Films of State, a three day online conference focused on government films and NARA’s holdings, scheduled for April 7-9, 2021. How the Films of State Conference Came to Be. You can learn more about the program and register at the Films of State conference webpage.

article thumbnail

Information Disaster Plan

The Texas Record

What types of information is your government creating? Where are your government’s offices geographically located? Also research the impact of the information’s proximity to potential man-made hazards, for example the airport, military bases, plants or factories that handle hazardous or flammable material.

Paper 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is the federal government ready for robotic process automation?

CGI

Is the federal government ready for robotic process automation? Don’t think of the shambling, clanking humanoid automatons from 1950s sci-fi, or even the sleek bomb-disposal robots used today by the military and police departments. CGI will present a case study of RPA on the second day of the event. harini.kottees….

article thumbnail

Jen Easterly Takes Charge of CISA At Black Hack USA 2021

ForAllSecure

The real puzzle was how to get public and private institutions to work together to solve the problems infosec faces today. She is a daughter of a military father and so she went to West Point Academy, as one of the first female cadets. Easterly began by presenting her bio. She later returned to West Point to teach.

article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

The governments of the world wanted the quick and agile minds of children who could think three dimensional -- and without all that moralizing about killing, you know, space aliens. A red team would be the enemy and they’d study your network and try to exploit any weaknesses. Vamosi: So how do you simulate an attack?

article thumbnail

SHARED INTEL Q&A: Bi-partisan report calls a for a self-sacrificing approach to cybersecurity

The Last Watchdog

Here’s the exchange, edited for clarity and length: LW: Should we be more concerned about cyber exposures than classic military threats? Romanoff: Classic military threats will always merit significant concern due to their direct impact on life. Last Watchdog queried Tom Romanoff, BPC’s technology project director about this analysis.

article thumbnail

ForAllSecure Launches The Hacker Mind Podcast

ForAllSecure

In the inaugural episode, The Hacker Mind looks at why the West Point Military Academy, and other organizations within the DoD, is training its young cadets to hack. Or maybe, just maybe back in 2014, West Point and other military service academies, are on to something really important. The military has these massive computer networks.