際際滷shows by User: JohnGilligan7 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: JohnGilligan7 / Fri, 17 Jun 2016 18:06:26 GMT 際際滷Share feed for 際際滷shows by User: JohnGilligan7 Practical approaches to address government contracting problems /slideshow/practical-approaches-to-address-government-contracting-problems/63184801 practicalapproachestoaddressgovernmentcontractingproblems-160617180627
A presentation to Defense Acquisition University by John Gilligan.]]>

A presentation to Defense Acquisition University by John Gilligan.]]>
Fri, 17 Jun 2016 18:06:26 GMT /slideshow/practical-approaches-to-address-government-contracting-problems/63184801 JohnGilligan7@slideshare.net(JohnGilligan7) Practical approaches to address government contracting problems JohnGilligan7 A presentation to Defense Acquisition University by John Gilligan. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/practicalapproachestoaddressgovernmentcontractingproblems-160617180627-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation to Defense Acquisition University by John Gilligan.
Practical approaches to address government contracting problems from John Gilligan
]]>
225 4 https://cdn.slidesharecdn.com/ss_thumbnails/practicalapproachestoaddressgovernmentcontractingproblems-160617180627-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Economics of Cyber Security /slideshow/the-economics-of-cyber-security/63151195 dsbpresentationoneconomicsofcybersecurity5-5-15-160616193118
A DSB presentation on economics of cyber security delivered on May 5, 2015 ]]>

A DSB presentation on economics of cyber security delivered on May 5, 2015 ]]>
Thu, 16 Jun 2016 19:31:18 GMT /slideshow/the-economics-of-cyber-security/63151195 JohnGilligan7@slideshare.net(JohnGilligan7) The Economics of Cyber Security JohnGilligan7 A DSB presentation on economics of cyber security delivered on May 5, 2015 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dsbpresentationoneconomicsofcybersecurity5-5-15-160616193118-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A DSB presentation on economics of cyber security delivered on May 5, 2015
The Economics of Cyber Security from John Gilligan
]]>
1050 8 https://cdn.slidesharecdn.com/ss_thumbnails/dsbpresentationoneconomicsofcybersecurity5-5-15-160616193118-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Top Level Cyber Security Strategy /slideshow/top-level-cyber-security-strategy/63151096 toplevelcybersecuritystrategy-affirm2-17-10-160616192806
Presented to AFFIRM on February 17, 2010 ]]>

Presented to AFFIRM on February 17, 2010 ]]>
Thu, 16 Jun 2016 19:28:06 GMT /slideshow/top-level-cyber-security-strategy/63151096 JohnGilligan7@slideshare.net(JohnGilligan7) Top Level Cyber Security Strategy JohnGilligan7 Presented to AFFIRM on February 17, 2010 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/toplevelcybersecuritystrategy-affirm2-17-10-160616192806-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented to AFFIRM on February 17, 2010
Top Level Cyber Security Strategy from John Gilligan
]]>
803 6 https://cdn.slidesharecdn.com/ss_thumbnails/toplevelcybersecuritystrategy-affirm2-17-10-160616192806-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) /slideshow/automating-enterprise-it-management-by-leveraging-security-content-automation-protocol-scap/63150986 scapstoryv9jgedits5-31-09-160616192438
The story of Security Content Automation Protocol (SCAP)]]>

The story of Security Content Automation Protocol (SCAP)]]>
Thu, 16 Jun 2016 19:24:37 GMT /slideshow/automating-enterprise-it-management-by-leveraging-security-content-automation-protocol-scap/63150986 JohnGilligan7@slideshare.net(JohnGilligan7) Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) JohnGilligan7 The story of Security Content Automation Protocol (SCAP) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/scapstoryv9jgedits5-31-09-160616192438-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The story of Security Content Automation Protocol (SCAP)
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) from John Gilligan
]]>
408 6 https://cdn.slidesharecdn.com/ss_thumbnails/scapstoryv9jgedits5-31-09-160616192438-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Leveraging Purchase Power and Standards to Improve Security in the IT Supply Chain /slideshow/leveraging-purchase-power-and-standards-to-improve-security-in-the-it-supply-chain/63150922 johngilliganfs-isac5-5-2009-160616192221
Presented at ISAC, May 5, 2009. ]]>

Presented at ISAC, May 5, 2009. ]]>
Thu, 16 Jun 2016 19:22:21 GMT /slideshow/leveraging-purchase-power-and-standards-to-improve-security-in-the-it-supply-chain/63150922 JohnGilligan7@slideshare.net(JohnGilligan7) Leveraging Purchase Power and Standards to Improve Security in the IT Supply Chain JohnGilligan7 Presented at ISAC, May 5, 2009. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/johngilliganfs-isac5-5-2009-160616192221-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at ISAC, May 5, 2009.
Leveraging Purchase Power and Standards to Improve Security in the IT Supply Chain from John Gilligan
]]>
148 6 https://cdn.slidesharecdn.com/ss_thumbnails/johngilliganfs-isac5-5-2009-160616192221-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Is Cyber Resilience Really That Difficult? /slideshow/is-cyber-resilience-really-that-difficult/63150836 iscyberresiliencereallythatdifficult-mitreresiliencyworkshop5-18-16final-160616191912
A presentation made to the 6th Cyber Resiliency Workshop, sponsored by Mitre Corporation (May 18, 2016)]]>

A presentation made to the 6th Cyber Resiliency Workshop, sponsored by Mitre Corporation (May 18, 2016)]]>
Thu, 16 Jun 2016 19:19:11 GMT /slideshow/is-cyber-resilience-really-that-difficult/63150836 JohnGilligan7@slideshare.net(JohnGilligan7) Is Cyber Resilience Really That Difficult? JohnGilligan7 A presentation made to the 6th Cyber Resiliency Workshop, sponsored by Mitre Corporation (May 18, 2016) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iscyberresiliencereallythatdifficult-mitreresiliencyworkshop5-18-16final-160616191912-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation made to the 6th Cyber Resiliency Workshop, sponsored by Mitre Corporation (May 18, 2016)
Is Cyber Resilience Really That Difficult? from John Gilligan
]]>
1931 8 https://cdn.slidesharecdn.com/ss_thumbnails/iscyberresiliencereallythatdifficult-mitreresiliencyworkshop5-18-16final-160616191912-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Implementing Continuous Monitoring /slideshow/implementing-continuous-monitoring/63150750 fedtechmagazinecontinuousmonitoring12-1-11-160616191621
Webinar for FedTech Magazine on Continuous Monitoring, presented on December 1, 2011]]>

Webinar for FedTech Magazine on Continuous Monitoring, presented on December 1, 2011]]>
Thu, 16 Jun 2016 19:16:21 GMT /slideshow/implementing-continuous-monitoring/63150750 JohnGilligan7@slideshare.net(JohnGilligan7) Implementing Continuous Monitoring JohnGilligan7 Webinar for FedTech Magazine on Continuous Monitoring, presented on December 1, 2011 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fedtechmagazinecontinuousmonitoring12-1-11-160616191621-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Webinar for FedTech Magazine on Continuous Monitoring, presented on December 1, 2011
Implementing Continuous Monitoring from John Gilligan
]]>
177 4 https://cdn.slidesharecdn.com/ss_thumbnails/fedtechmagazinecontinuousmonitoring12-1-11-160616191621-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Federal Risk and Authorization Management Program: Assessment and Recommendations /slideshow/federal-risk-and-authorization-management-program-assessment-and-recommendations/63150701 federalriskandauthorizationmanagementprogramrecommendations12-15-10-160616191414
A presentation made on December 15, 2010]]>

A presentation made on December 15, 2010]]>
Thu, 16 Jun 2016 19:14:14 GMT /slideshow/federal-risk-and-authorization-management-program-assessment-and-recommendations/63150701 JohnGilligan7@slideshare.net(JohnGilligan7) Federal Risk and Authorization Management Program: Assessment and Recommendations JohnGilligan7 A presentation made on December 15, 2010 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/federalriskandauthorizationmanagementprogramrecommendations12-15-10-160616191414-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation made on December 15, 2010
Federal Risk and Authorization Management Program: Assessment and Recommendations from John Gilligan
]]>
228 5 https://cdn.slidesharecdn.com/ss_thumbnails/federalriskandauthorizationmanagementprogramrecommendations12-15-10-160616191414-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security: Threats and Needed Actions /slideshow/cyber-security-threats-and-needed-actions-63150631/63150631 dodnationalsecuritystudiesprogram-gwu-4-1-09-160616191208
Presented to the DOD National Security Studies Program at GWU (April 1, 2009) ]]>

Presented to the DOD National Security Studies Program at GWU (April 1, 2009) ]]>
Thu, 16 Jun 2016 19:12:07 GMT /slideshow/cyber-security-threats-and-needed-actions-63150631/63150631 JohnGilligan7@slideshare.net(JohnGilligan7) Cyber Security: Threats and Needed Actions JohnGilligan7 Presented to the DOD National Security Studies Program at GWU (April 1, 2009) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dodnationalsecuritystudiesprogram-gwu-4-1-09-160616191208-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented to the DOD National Security Studies Program at GWU (April 1, 2009)
Cyber Security: Threats and Needed Actions from John Gilligan
]]>
202 5 https://cdn.slidesharecdn.com/ss_thumbnails/dodnationalsecuritystudiesprogram-gwu-4-1-09-160616191208-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding Technology Stakeholders: Their Progress and Challenges /slideshow/understanding-technology-stakeholders-their-progress-and-challenges/63150422 dhssoftwareassuranceconference-11-4-09gilliganfinal-160616190629
Presented at the Software Assurance Forum, DHS (November 4, 2009) ]]>

Presented at the Software Assurance Forum, DHS (November 4, 2009) ]]>
Thu, 16 Jun 2016 19:06:29 GMT /slideshow/understanding-technology-stakeholders-their-progress-and-challenges/63150422 JohnGilligan7@slideshare.net(JohnGilligan7) Understanding Technology Stakeholders: Their Progress and Challenges JohnGilligan7 Presented at the Software Assurance Forum, DHS (November 4, 2009) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dhssoftwareassuranceconference-11-4-09gilliganfinal-160616190629-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at the Software Assurance Forum, DHS (November 4, 2009)
Understanding Technology Stakeholders: Their Progress and Challenges from John Gilligan
]]>
93 5 https://cdn.slidesharecdn.com/ss_thumbnails/dhssoftwareassuranceconference-11-4-09gilliganfinal-160616190629-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybersecurity Priorities and Roadmap: Recommendations to DHS /slideshow/cybersecurity-priorities-and-roadmap-recommendations-to-dhs/63150366 cybersecurityroadmapfordhs11-20-09-subset2-26-10-160616190421
This is a subset of the original charts, presented to DHS (November 20, 2009)]]>

This is a subset of the original charts, presented to DHS (November 20, 2009)]]>
Thu, 16 Jun 2016 19:04:20 GMT /slideshow/cybersecurity-priorities-and-roadmap-recommendations-to-dhs/63150366 JohnGilligan7@slideshare.net(JohnGilligan7) Cybersecurity Priorities and Roadmap: Recommendations to DHS JohnGilligan7 This is a subset of the original charts, presented to DHS (November 20, 2009) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityroadmapfordhs11-20-09-subset2-26-10-160616190421-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a subset of the original charts, presented to DHS (November 20, 2009)
Cybersecurity Priorities and Roadmap: Recommendations to DHS from John Gilligan
]]>
863 7 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityroadmapfordhs11-20-09-subset2-26-10-160616190421-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybersecurity: Challenges, Initiatives, and Best Practices /slideshow/cybersecurity-challenges-initiatives-and-best-practices/63150031 ncmsannualtrainingseminarkeynotejune152010final-160616185447
A keynote address delivered at the MCMS Annual Training Seminar (June 15, 2010) ]]>

A keynote address delivered at the MCMS Annual Training Seminar (June 15, 2010) ]]>
Thu, 16 Jun 2016 18:54:47 GMT /slideshow/cybersecurity-challenges-initiatives-and-best-practices/63150031 JohnGilligan7@slideshare.net(JohnGilligan7) Cybersecurity: Challenges, Initiatives, and Best Practices JohnGilligan7 A keynote address delivered at the MCMS Annual Training Seminar (June 15, 2010) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ncmsannualtrainingseminarkeynotejune152010final-160616185447-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A keynote address delivered at the MCMS Annual Training Seminar (June 15, 2010)
Cybersecurity: Challenges, Initiatives, and Best Practices from John Gilligan
]]>
200 6 https://cdn.slidesharecdn.com/ss_thumbnails/ncmsannualtrainingseminarkeynotejune152010final-160616185447-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Federal Cybersecurity: The latest challenges, initiatives and best practices /slideshow/federal-cybersecurity-the-latest-challenges-initiatives-and-best-practices/63149966 i360govwebinar4-29-10-160616185254
A presentation made on April 29, 2010 about federal cybersecurity best practices]]>

A presentation made on April 29, 2010 about federal cybersecurity best practices]]>
Thu, 16 Jun 2016 18:52:54 GMT /slideshow/federal-cybersecurity-the-latest-challenges-initiatives-and-best-practices/63149966 JohnGilligan7@slideshare.net(JohnGilligan7) Federal Cybersecurity: The latest challenges, initiatives and best practices JohnGilligan7 A presentation made on April 29, 2010 about federal cybersecurity best practices <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/i360govwebinar4-29-10-160616185254-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation made on April 29, 2010 about federal cybersecurity best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices from John Gilligan
]]>
276 7 https://cdn.slidesharecdn.com/ss_thumbnails/i360govwebinar4-29-10-160616185254-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Leveraging Federal Procurement to Improve Cyber Security /slideshow/leveraging-federal-procurement-to-improve-cyber-security/63149891 coalitionforgovernmentprocurement8-5-09-160616185053
Presented to the Coalition for Government Procurement Security Committee Meeting (August 5, 2009)]]>

Presented to the Coalition for Government Procurement Security Committee Meeting (August 5, 2009)]]>
Thu, 16 Jun 2016 18:50:53 GMT /slideshow/leveraging-federal-procurement-to-improve-cyber-security/63149891 JohnGilligan7@slideshare.net(JohnGilligan7) Leveraging Federal Procurement to Improve Cyber Security JohnGilligan7 Presented to the Coalition for Government Procurement Security Committee Meeting (August 5, 2009) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/coalitionforgovernmentprocurement8-5-09-160616185053-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented to the Coalition for Government Procurement Security Committee Meeting (August 5, 2009)
Leveraging Federal Procurement to Improve Cyber Security from John Gilligan
]]>
174 6 https://cdn.slidesharecdn.com/ss_thumbnails/coalitionforgovernmentprocurement8-5-09-160616185053-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security: Past and Future /slideshow/cyber-security-past-and-future-63149793/63149793 certpresentation3-10-09-160616184816
A presentation delivered to CERT's 20th Anniversary Technical Symposium in Pittsburgh, PA (3/10/2009)]]>

A presentation delivered to CERT's 20th Anniversary Technical Symposium in Pittsburgh, PA (3/10/2009)]]>
Thu, 16 Jun 2016 18:48:16 GMT /slideshow/cyber-security-past-and-future-63149793/63149793 JohnGilligan7@slideshare.net(JohnGilligan7) Cyber Security: Past and Future JohnGilligan7 A presentation delivered to CERT's 20th Anniversary Technical Symposium in Pittsburgh, PA (3/10/2009) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/certpresentation3-10-09-160616184816-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation delivered to CERT&#39;s 20th Anniversary Technical Symposium in Pittsburgh, PA (3/10/2009)
Cyber Security: Past and Future from John Gilligan
]]>
155 6 https://cdn.slidesharecdn.com/ss_thumbnails/certpresentation3-10-09-160616184816-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/practicalapproachestoaddressgovernmentcontractingproblems-160617180627-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/practical-approaches-to-address-government-contracting-problems/63184801 Practical approaches t... https://cdn.slidesharecdn.com/ss_thumbnails/dsbpresentationoneconomicsofcybersecurity5-5-15-160616193118-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-economics-of-cyber-security/63151195 The Economics of Cyber... https://cdn.slidesharecdn.com/ss_thumbnails/toplevelcybersecuritystrategy-affirm2-17-10-160616192806-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/top-level-cyber-security-strategy/63151096 Top Level Cyber Securi...