bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
5:31 pm, October 25, 2014

Search Result

Search Tags:  Mark Cohn

Achieving FISMA - High Compliance With Public Clouds

Security concerns remain a major hurdle for federal agencies considering public clouds, especially when it comes to migrating mission-critical workloads. Agencies that have invested in their existing infrastructure still want to leverage the benefits of cloud utility-based services while meeting the compliance requirements of FISMA-High. How can government use public clouds to manage costs and improve IT service delivery to end users while overcoming security concerns and meeting FISMA- High?

Tags: Unisys , Modern Mission Critical Series , FISMA , Tom Temin , David Wennergren , cloud

Wednesday - 10/22/2014, 11:57am EDT

Mark Cohn, Chief Technology Officer, Unisys Federal Systems

When it comes to critical infrastructure cybersecurity, White House policy has federal agencies and the private sector joined at the hip. So it matters to the federal government how good the private sector is at cyber. Unisys and the Poneman Institute surveyed companies who operate critical infrastructure. The picture isn't great. Mark Cohn, the chief technology officer of Unisys Federal Systems, joined Tom Temin and Emily Kopp on the Federal Drive to discuss the results of the survey.

Tags: Unisys Federal Systems , cybersecurity , Federal Drive , Tom Temin , Emily Kopp

Thursday - 07/10/2014, 06:48am EDT
Listen

In Depth interviews - May 14

On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.

Tags: Brenda Brockman Smith , CBP , H. Allen Dobbs , Sammies Awards , Tom Vilsack , agriculture , Sharon Pickup , GAO , Unisys , Jeff Neel , ICF International , Linda Bilmes

Tuesday - 05/15/2012, 01:20am EDT

Unisys survey shows shift in Americans security concerns

Unisys Vice President for Enterprise Security Mark Cohn explains how the federal government can use such information to shape public policy.

Tags: technology , management , Unisys , security , Dorothy Ramienski , 2009 Unisys Security Index

Tuesday - 10/27/2009, 03:21pm EDT
Listen

Why is CyberSecurity so Hard?

Dec. 14th, 10:00 am

Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.

Tags: technology , Center for Innovation in Government , cyber , cybersecurity , security , Unisys , Anthony Valletta , Amit Yoran , Andre Eaddy

Wednesday - 12/08/2010, 05:06pm EST
Listen

Identification Technology and Citizen Privacy

June 15th

The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver's licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.

Tags: technology , Center for Innovation in Government , Identification , privacy , security , Unisys , Bryan Ichikawa , Dr. Larry Ponemon , Ponemon Institute

Monday - 05/31/2010, 09:14pm EDT
Listen