Back to Search Begin New Search Save Search Auto-Notify
Securing Our States: Core Pillars of St...
Forward-thinking state and local governments are participating in the State Risk and Authorization Management Program (StateRAMP) as they build out a robust and secure IT infrastructure. Modeled after the federal government's FedRAMP, the nonprofit membership organization uses independent audits and continuous monitoring to verify that cloud services satisfy standardized state government security requirements and can be used by agencies in mul...
June 26, 2024
Organizer: Route Fifty x The Atlas
Location: Webcast
Add Favorite
Tech 101: Trustworthy AI
The Department of Defense (DoD)’s research and modernization priorities within artificial intelligence (AI) require transformative initiatives to ensure the United States remains at the cutting edge of technology. An important goal of DoD’s is to develop AI that is trustworthy, particularly when making life-or-death recommendations to warfighters. The 2023 Data, Analytics and Artificial Intelligence Adoption Strategy, which was dev...
June 26, 2024
Organizer: NDIA - National Defense Industrial Association
Location: Webcast
Add Favorite
Sponsored Content: Palmetier Law - Unle...
Unleashing Small Business Innovations: A Path to Growth and ProsperityPART 2 of 2 SPONSORED CONTENT Webinar is Complimentary & Recorded Kari Palmetier, Palmetier Law The role of small businesses in driving innovation in the federal government has never been more crucial. This two-part webinar explores the basis and requirements of Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) programs and the ways...
June 27, 2024
Organizer: Jennifer Schaus & Associates
Location: Webcast
Add Favorite
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Facilitating Low-Head Dam Removals and...
Join us on July 9, from 12:00 PM - 2:00 PM Eastern for Facilitating Low-Head Dam Removals and Improving Aquatic Resource Restoration Outcomes. Many low-head dams no longer serve their original purpose and their existence often poses a public safety risk and continues to have negative impacts on aquatic resources. This webinar will focus on effective strategies for low head dam removal and aquatic resource restoration in Pennsylvania over the l...
July 9, 2024
Organizer: Association of State Dam Safety Officials
Location: Webcast
Add Favorite
Boosting Data Security & Cyber Resilien...
All the elements of the U.S. healthcare system are under siege by hackers. A recent article in Modern Healthcare reported that “[o]ver the past five years, there’s been a 256% increase in large breaches reported to [the U.S. Department of Health and Human Services] involving hacking and a 264% increase in ransomware.” Federal health agencies face the same risks – and private-sector attacks ripple through the agencies, a...
July 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Quantum Speaker Series PQC Roadmap
Christian Lowry is the Emerging Risks Branch Chief in the National Risk Management Center, part of the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Christian leads a team of analysts assessing risks to critical infrastructure from emerging technologies, including artificial intelligence and quantum computing. Christian has also led NRMC’s analysis efforts related to the Information...
July 9, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Assessing Controls in Performance Audits
Internal control is an important focus for auditors as they commonly identify weaknesses in internal controls as an underlying cause of organizations struggling to deliver effective and efficient results. Through lecture, group discussions, and case studies, this course provides auditors with a comprehensive understanding of the five components of internal control and the 17 underlying principles. The course will explain the audit planning and...
July 10-11, 2024
Organizer: Parker CPE
Location: Webcast
Add Favorite
Beyond Traditional Boundaries: Moderniz...
While the Personal Identity Verification (PIV) and Common Access Card (CAC) represent a high assurance, technically interoperable, and a highly regulated method of authentication, they suffer from factors such as ease of use, ability to work with mobile devices and across devices. Office of Management and Budget (OMB) memorandum M-19-17, Enabling Mission Delivery Through Improved Identity, Credential, and Access Management, opened the door for...
July 11, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search