How to Prioritize Your Cybersecurity Applications on a Limited Budget
This panel of thought leaders will discuss how they analyze and decide on the best cybersecurity applications for their needs and how to optimize their efforts to ensure security is maintained while balancing the budget. Featuring insights from:
- Arielle Schneider, CIPP/US, JD, Privacy Officer, Virginia Department of Elections
- Michael Dent, Chief Information Cyber Security and Privacy Officer, Fairfax County Government
- Peter Romness, Cybersecurity Principal, CISO Advisors Office, Cisco
Recommendations
GIW Federal 2025: From Audits to Automation: Continuous Compliance for Secure-by-Design Government with Ken Melero
INDUSTRY TRENDS
26 Nov 2025
Let's Chat: Beyond Human Access: Securing Machine Identities — The Next Frontier of Public Sector Cybersecurity
INTERVIEWS
17 Sep 2025
EntraGoat is a deliberately vulnerable lab that simulates real-world identity misconfigurations in Microsoft Entra ID.
GUIDES
6 Nov 2025
GIW Federal 2025: Cyber Resilience & Organisational Uptime Using Microsegmentation by Raja Ukil
INDUSTRY TRENDS
27 Nov 2025
IBM Launches Microsoft Practice to Deliver Transformative Business Value for Clients
INDUSTRY TRENDS
29 Sep 2025


