Back to Search Begin New Search Save Search Auto-Notify
How to Improve Federal Mobile Security...
The Federal Mobility Group (FMG), established by the Federal CIO Council, was tasked with improving cybersecurity, governance, and accountability for federal mobile device usage and programs. Co-chaired by mobile leaders from DHS, GSA, and NIST, the FMG sponsors a Federal Information Security Modernization Act (FISMA) Mobility Metrics Working Group (FMMWG) that is focused on updating the FISMA mobility metrics for fiscal year 2022 and beyond....
October 21, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Accelerating Government IT Innovation a...
Application modernization is a key consideration when switching from on-premises systems to the public cloud, whether the impetus is a cloud-first directive or a push from within IT to digitize legacy systems. It can reduce operational overhead, replace obsolete technologies and improve user experience. Listen as topic experts dive into why modernizing cloud applications is important for cloud migration. When taking on the task of modernizing...
October 19, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Advancing Security Within The Federal G...
As new technologies are being implemented and deployed throughout the Federal Government, agencies are having to take a step back and ensure their systems are secure. Tune into this panel to hear from topic experts on best practices to enable enterprises to adopt new connected devices without fear of compromise by cyber-attack. Zero Trust security is a framework of policies, technologies, and systems that are applied to users and devices. Hear...
October 14, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Making IT Service Management and Securi...
It’s no secret that getting a clear picture of your hardware, software, and services can be a challenge. Federal IT leaders frequently list vendor audits and unexpected software license true-up as a top concern. Add to the mix – constant adaptation to changing technologies, cyber-attack vulnerability mitigation, and IT asset availability and management in complex hybrid environments – and you start to uncover the challenges i...
October 7, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Why Operational Technology and IT Manag...
In today’s traditional Operational Technology (OT) management environment, organizations use outdated software that does not scale to the demands of the modern digital environment. Organizations have struggled to efficiently secure, monitor and manage an Operational Technology environment. This along with a lack of effective systems management leaves OT systems open to significant cyber attack risk and financial impact. How can organizat...
October 5, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Building Cyber Resilience with Zero Tru...
Zero Trust Data Management is more than the latest buzzword. With the new Executive Order on Improving the Nation’s Cybersecurity, coupled with Federal agencies creating data at breakneck speeds and an unprecedented growth in ransomware attacks – their need to better understand, easily share and protect their data by staying ahead of cyber adversaries is a top priority for Federal leaders. Add to that, traditional IT security defen...
September 30, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Hear From the Authors: Federal Zero Tru...
Among other Federal Government initiatives, the Executive Order 14028 of May 2021, “Improving the Nation’s Cybersecurity” triggered the creation of three documents, critical to helping agencies to adopt zero trust cybersecurity principles and adjust their network architectures accordingly. The Office of Management and Budget (OMB) has released a draft Federal Zero Trust Strategy, to adapt and accelerate civilian agencies...
September 23, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Modernizing Authentication Across Feder...
With NIST 800-63 Digital Identity Guideline guidance on Fast IDentity Online (FIDO) expected in 2022, Federal agencies need to start thinking about modernizing authentication across internal and external applications and infrastructures today. Relying on username and password or mobile-based authentication for use cases such as cloud, citizen-facing digital services, and areas where Personal Identity Verification (PIV) and Common Access Card (...
September 16, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Transforming Agency Security Operations...
Cyberattacks and threats are becoming increasingly sophisticated and dangerous. To keep up with the speed of cybersecurity threats, agencies must implement security operations that include Artificial Intelligence (AI), integration and automation. Artificial Intelligence can help cybersecurity professionals maintain situational awareness of their operating environments. Yet, understanding the available options and practical considerations to im...
September 15, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Navigating the Road Ahead for Zero Trust
In earlier ATARC Zero Trust sessions, we discussed why Zero Trust is important for securing enterprise resources in a cloud and multi-cloud environment. In this panel discussion, we will dig into practical approaches to executing a Zero Trust modernization plan. Topic experts will cover how priorities and strategies have evolved in the months since the Biden Cybersecurity Executive Order. Join this webinar to hear topics such as: Assessing cur...
September 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search