Skip to content

Latest commit

 

History

History
48 lines (35 loc) · 4.97 KB

blogs.md

File metadata and controls

48 lines (35 loc) · 4.97 KB

Blogs

Articles or blog posts where I'm the author or co-author. Reproduced here with source location.

2023

Title Topic Date Role Published Link
1. Digital Autopen Playbook pinpoints how agencies can leverage technology for digital signatures Digital Signature May 2023 Co-Author Digital.gov Blog{:target="_blank"}{:rel="noopener noreferrer"}

2022

Title Topic Date Role Published Link
3. The Privileged Identity Playbook Guides Management of Privileged User Accounts Privileged Identity November 2022 Author Digital.gov Blog{:target="_blank"}{:rel="noopener noreferrer"}
2. Modernize Your Identity Management Process Through ILM Identity Lifecycle Management August 2022 Co-Author GSA Blog{:target="_blank"}{:rel="noopener noreferrer"}
1. Achieve Zero Trust Capabilities Using These Cloud Identity Adoption Best Practices Cloud Single Sign-On March 2022 Author GSA Blog{:target="_blank"}{:rel="noopener noreferrer"}

2021

Title Topic Date Role Published Link
5. White House Releases Draft Federal Zero Trust Strategy Zero Trust September 2021 Author ISACA GWDC Blog{:target="_blank"}{:rel="noopener noreferrer"}
4. How GSA worked with stakeholders to improve federal ID website usability Federal ICAM August 2021 Author GSA Blog{:target="_blank"}{:rel="noopener noreferrer"}
3. Managing Digital Identity Risk Digital Identity Risk Assessment May 2021 Co-Author GSA Blog{:target="_blank"}{:rel="noopener noreferrer"}
2. Are We Federated Yet? Single Sign-On February 2021 Author GSA Blog{:target="_blank"}{:rel="noopener noreferrer"}
1. Are You Securing Your Digital Workforce? Digital Worker Identity Management January 2021 Co-Author GSA Blog{:target="_blank"}{:rel="noopener noreferrer"}

2019

Title Topic Date Role Published Link
3. Federal Identities and Zero Trust) Zero Trust October 2019 Author ISACA GWDC Blog{:target="_blank"}{:rel="noopener noreferrer"}
2. A Holistic Approach to Data Loss Prevention Data Loss Prevention (DLP) October 2019 Co-Author Protiviti Technology Blog{:target="_blank"}{:rel="noopener noreferrer"}
1. Cloud Security in Financial Services – Are you Cloud First or Cloud Averse? Cloud Access Security Broker (CASB) June 2019 Co-Author Protiviti Technology Blog{:target="_blank"}{:rel="noopener noreferrer"}

2018

Title Topic Date Role Published Link
1. Worried About Regulatory Compliance with Cloud Data? Use a CASB Cloud Access Security Broker (CASB) September 2018 Author Protiviti Technology Blog{:target="_blank"}{:rel="noopener noreferrer"}

2017

Title Topic Date Role Published Link
2. Top Three Uses of Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) December 2017 Author LinkedIn{:target="_blank"}{:rel="noopener noreferrer"}
1. Help! I'm Sinking! Three Tips for an Empty Inbox Email Management May 2017 Author LinkedIn{:target="_blank"}{:rel="noopener noreferrer"}