About Kerry Rea President of GovEvents

Twitter: @Kerry_Rea | LinkedIn: www.linkedin.com/in/kerryrea/ I am a business and marketing professional with an extensive background in company start-ups. I have 20+ years direct experience in the information technology, government, franchise, and construction industries. Having a passion for business, I love brainstorming, collaborating and strategizing on the best ways to achieve our clients' and partners' business objectives.

Digital Forensics 101

The digitization of records and processes across government increases the need for sound digital investigation tools and processes. Whether it is looking into a data breach or gathering information for litigation, organizations are spending a lot of time culling through this data to get answers to pressing issues. An IDG survey found that a vast majority of organizations conduct digital investigations on a weekly basis. These investigations range from proving regulatory compliance, security incident response (including post-event analysis), and stopping high risk employee behavior (acceptable use violations).[Tweet "A look at digital investigations with Tod Ewasko, Director of Product Mgmt. at AccessData. #GovEventsBlog"]

We sat down with Tod Ewasko, Director of Product Management at AccessData to learn more about the role of digital investigations as a part of everyday IT efforts.

Q: Who "owns" forensics? IT? Legal? HR?

A: The answer is kind of all three. Many people lump forensics in with cybersecurity, but it's really a separate entity. Yes, forensics tools are used to investigate cyber incidents, but they are not preventative. That is what you have the "hunting" tools out there for - watching firewalls and logs for anomalous behavior or activity. Once that is stopped, then the forensics tools come in to make sense of it - to see how it happened and drive the plans to make sure it does not happen again. Forensic tools look beyond the event and gather all data relevant to the systems in question.

Q: Is forensics all reactive then? Continue reading

Give Them a (Meaningful) Break

Time is a precious commodity. With events, attendees are giving up precious time away from the office and possibly, away from their families. Because event organizers know that their attendees' time is valuable, their response is often to pack as much into an event as possible to provide the most value in attending. But, as in many areas of life, this "more is more" mentality can backfire. A lack of breaks can leave attendees tired and their purpose for attending left unfulfilled. Without these breaks, there is no time for attendees to absorb information or make impromptu connections. [Tweet "Time is a precious commodity. Give attendees a meaningful break. #GovEventsBlog"]

If the event is organized in a way that encourages interaction with and by attendees, you want to give them the chance to recharge from all of that engagement. A study published in the Harvard Business Review revealed that the most engaged employees are also the ones that burn out the quickest. With this understanding, it makes sense that engaged event attendees will get tired (burn out) as they are being challenged with new ideas and information. So, what should event planners do to maximize both the quantity and quality of the time spent with their attendees?[Tweet "A lack of breaks can leave attendees tired and their purpose for attending left unfulfilled. #GovEventsBlog"]

Continue reading

A Bitcoin for Your Thoughts: Demystifying Blockchain

Blockchain is a new way to structure data for greater sharing and security. Its algorithm and distributed data structure were initially designed to manage online currency (like bitcoin) in a way that does not need a central administrator to distribute it among people. This removed the need for a middleman (like a bank) to authenticate that what was being transferred was real currency. Instead, this authentication happens because all of the nodes on a peer-to-peer network connected to the block (the asset, money, or data) have to "approve" its transfer to a new party (a good image of this process is found here).

Blockchain essentially provides an online ledger book. The records (or blocks) are individually secured using cryptography that links them to one another and gives each block its own timestamp and provides data about that particular transaction (who it went to). Looking at the ledger you can see where data started and where it went. Through cryptography and the intricate linkages, the blocks (the original asset) cannot be tampered with. This traceability and security has gotten the attention of the government as a way to better protect sensitive data and transactions. Agencies are investigating how to use it to speed procurement, secure employee records, and better enable electronic health records.[Tweet "The traceability & security of blockchain tech has gotten the attention of the Government. #GovEventsBlog"] Continue reading

Getting (Vendor) Certified

We've written before about the importance of certifications for expanding your knowledge base and helping you stand out among competition when looking for new career opportunities. As we highlighted in that post, industry certifications show mastery of a certain skill area from security to project management to database administration. Today we want to highlight the power of vendor-specific certifications for your career.[Tweet "Getting Vendor Certified -- The power of vendor-specific certifications for your career. #GovEventsBlog"]

Much like we wrote about the value of vendor-led events, there is a tangible benefit in being certified in specific technologies as there's no escaping the major technology vendors. Their technology is in place across the government and oftentimes is providing the platform on which entire IT infrastructures are designed. Doing a deep dive and getting certified in a technology that is critical to your agency makes you a key resource for ensuring that the systems that rely on that vendor keep running and evolving.

Based on what we see in the market, here are some recommendations of vendor certifications that can add to your knowledge-base as well as your value to current and future employers.[Tweet "Recommendations of vendor certifications that can add to your knowledge-base. #GovEventsBlog"] Continue reading

Adding Code-A-Thons to the Event Mix

Code-a-thons and hack-a-thons have moved out of the basements of Silicon Valley and into ballrooms across the country. These events are usually one or two day intensive sessions where software developers work in teams to develop a technology solution to a stated challenge.

Recently, the Department of Health and Human Services (HHS) hosted one as part of their efforts around the national opioid crisis. The Opioid Symposium and Code-a-Thon allowed HHS to educate attendees on their five-part strategy for combatting opioid abuse. The event posed three challenge questions to programmers from private industry, academia, and government. From there, the 50 teams began designing solutions for the next 24 hours. Winners in each of the three tracks were selected the following day.[Tweet "New #GovEventsblog article: Adding Code-A-Thons to the Event Mix"]

While this in-person event was specific to a single government agency, the federal government as a whole has been hosting virtual code-a-thons since the launch of challenge.gov in 2010. This site allows federal agencies to submit a problem that needs a technical solution. Prize money is offered, and a time frame is given for the development of working code. Both individuals and companies are eligible to participate in solving complex, mission-centric problems. Continue reading