{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram

Air Force names Aaron Bishop as CISO

Bishop takes over the post from Wanda Jones-Heath, who has moved into a role as principal cybersecurity adviser at the department. Billy Mitchell has the story.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

New classification for federal data science jobs is part of NDAA

The legislation requires the Office of Personnel Management to establish specific job classifications for digital careers that will allow agencies to hire staff directly for their data science expertise. No such designation has previously existed across federal government. John Hewitt Jones has the details

JADC2 Cross Functional Team to stand up AI-focused working group

The team working to implement one of the military’s top modernization priorities stood up a new unit dedicated to the impact of artificial intelligence on battlefield command and control. Jackson Barnett has the scoop.

A bill codifying FedRAMP finally makes it to the Senate floor

A bipartisan group of senators touted the Senate Homeland Security Committee’s Wednesday approval of a bill to help agencies more quickly adopt cloud services as “commonsense” cybersecurity reform. Dave Nyczepir as the details.


The convergence of security compliance and actual security

Chief Technology Officer Archis Gore of Polyverse explains why organizations should focus on impact over actions in their cybersecurity posture. Listen to the interview.


WATCH: DOJ’s CIO on moving closer towards passwordless security authentication

Dept. of Justice’s Melinda Rogers on how the new zero trust executive order helps accelerate security modernization efforts to know who is accessing federal networks. Two challenges she is looking to overcome are reconciling zero-trust architecture with the agency’s current optimized Trusted Internet Connections (TIC) infrastructure and identifying edge use cases where they may adopt PKI-based tokens instead of PIV cards. Watch Rogers’ full interview here.

Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}