Back to Search Begin New Search Save Search Auto-Notify
How To Be Prepared Against Evolving Sof...
Combating modern-day software supply chain attacks is significantly more complicated than in the past. Adversaries are getting craftier and are no longer waiting to exploit publicly disclosed vulnerabilities to launch a cyberattack. By shifting their focus “upstream,” adversaries can infect a single open source component, which will then be distributed “downstream” using legitimate software workflows and update mechanis...
September 22, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
The Top Reasons for AI Project Failure...
Cognilytica is hosting Kathleen Walch and Ron Schmelzer, Managing Partners at Cognilytica, and their presentation ‘The Top Reasons for AI Project Failure - and What you can Do about it’ on Tuesday, September 20, 2022 at 11:30 AM ET! Artificial intelligence and advanced data projects are gaining rapid traction. However, with all this interest and hype in AI, only a small percentage of AI projects are actually seeing success. Why are...
September 20, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
Responsible AI & Speed to Mission: How...
With rapidly changing priorities, new threats, and an increasingly high expectation from citizens for digital services, government agencies must discover new ways to streamline their delivery of digital applications and systems. On top of that, they need to ensure that data and AI are being used responsibly. Responsible AI ensures that end-to-end model management addresses the specific risks of AI (i.e., discriminatory biases and lack of trans...
September 15, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
When All Fails: How To Be Cyber Resilient
There is a focus on ensuring an agency’s cybersecurity is as up to date as possible. But, what does one do when all systems put in place to assist in threat attacks break down? Given the high stakes in today’s cyber threat landscape, a good cyber strategy must be based on the assumption that, sooner or later, the agency’s defenses will fail. This assumption places the agency’s one step ahead of the attack: knowing that...
September 8, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
AUSA Noon Report - Pivot To Readiness w...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Wednesday, 7 September, at 12:00 PM EDT, to hear a presentation by LTG R. Scott Dingle. Joined by CSM Diamond Hough, Dingle will discuss how U.S. Army Medical Command is reor...
September 7, 2022
Organizer: Association of the United States Army (AUSA)
Location: Webcast
Add Favorite
Upskilling The Federal Workforce to Mee...
Technology is arguably at the center of every agency today. Introducing new technologies is important but in order for an agency to use them effectively, the workforce must evolve with the tech. Closing the gap between technology skills that are needed for mission success and those that are available is one of the most important challenges government agencies face. There doesn’t seem to be a week that goes by without a new publication on...
September 1, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
How AI is Making Self-Service a Reality...
AI in Government is excited to host Rushali Patil, Engagement Manager at Quantiphi and her presentation ‘How AI is Making Self-Service a Reality in the Public Sector’ on Tuesday, August 30, 2022 at 12PM ET! Many service-oriented government agencies have faced increasing pressure in recent years to keep up with many demands from an ever-changing environment. To meet these unprecedented inquiries, update guidelines frequently and acc...
August 30, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
The Quantum Security Challenge
Quantum computing is advancing rapidly, and its impact is likely to be large—their potential computational power that could render today’s encryption algorithms obsolete. To address this looming threat, the White House issued a National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM 10) this May. The NSM 10 fact sheet states that ...
August 25, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
AUSA Noon Report - MG Sean Gainey
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army.Please join us on Tuesday, 23 August 2022, at 1200 EST, to hear a presentation by MG Sean Gainey, Director, Joint Counter-small Unmanned Aircraft Systems Office, Director, Fires Headquarters De...
August 23, 2022
Organizer: Association of the United States Army (AUSA)
Location: Webcast
Add Favorite
Using IOT and AI to Transform Operation...
If your agency’s day-to-day operations are critically dependent on assets – such as processing equipment, facilities equipment, and infrastructure at large repair sites – maximizing uptime is a constant challenge. Without timely maintenance, equipment failure can be catastrophic, directly impacting operations and reducing mission readiness. The traditional approach of scheduled manual periodic checks and asset condition repor...
August 18, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search