Acting National Cyber Director, Kemba Walden, discusses the new National Cybersecurity Strategy at the Center for Strategic and International Studies. How will the U.S. government move forward on ...
As the fifth generation (5G) of mobile communications becomes the norm in civilian life, Department of Defense (DoD) leaders are also working on making it the standard on military bases. Now that ...
I recently facilitated a retreat with the European Management Team of a Global Client where we co-created a unique experience that will have a memorable impact on the sustainable implementation of ...
With about one year of Cyber Workforce Strategy implementation under the U.S. Department of Defense’s (DoD’s) belt, officials shared that the department accomplished about 90% of what it planned for ...
Forbes contributors publish independent expert analyses and insights. I write about self-leadership and leading others. Great strategy without disciplined execution is just wishful thinking. Most ...
As a result, I was impressed recently with the pragmatic guidance and recommendations on leading business growth in a new book, The Growth Leader, by Scott K. Edinger. Scott speaks from decades of ...
Digital transformation efforts are rapidly accelerating in the public sector. Spurred in part by the pandemic — and now, as state and local governments pivot to meet rising constituent expectations — ...
Climate change poses an immediate and serious threat to U.S. national security and affects how and where the Army trains and operates. As the Secretary of the Army (SecArmy) stated in the United ...
The Prescott City Council approved a Workforce Housing Strategy and Implementation Plan in a 4-3 vote during its meeting on ...
The Trump Cyber Strategy is broken into six policy pillars meant to guide development of more specific measures and their ...
Spread the loveIn a significant policy shift, the Trump administration has unveiled its National Cyber Strategy in March 2026, marking a pivotal moment in the integration of blockchain technology and ...
Approval and sponsorship for an information security strategy is only the beginning. Implementation of the strategy is when risk is truly mitigated, and applying these five principles is vital to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results