Back to Search Begin New Search Save Search Auto-Notify
Quantum Speaker Series Presents: Optimi...
Alex Khan is an advisor, entrepreneur, author and educator in quantum computing. He is CEO of ZebraKet, a Canadian startup in leak detection and sensor optimization using quantum methods and AI. He is the author of “Quantum Computing Experimentation with Amazon Braket”. He is currently a mentor at QuForce.org. He had roles at Chicago Quantum, where he co-authored papers on portfolio optimization using D-Wave, Harrisburg University...
September 26, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Strengthening Federal Software Infrastr...
Participate in an insightful panel discussion as we delve into the crucial topic of federal software supply chain modernization and compliance standards for Software Bill of Materials (SBOMs) in line with The President’s Executive Order 14028. This webinar aims to address the challenges faced by federal agencies, share best practices, explore avenues for improving efficiencies, and establish a compliance standard for SBOMs in the softwar...
August 24, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Identity - One Critical Element of CISA...
When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as “an attribute or set of attributes that uniquely describes an agency user or entity,...
August 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust: Driving Transformation and...
Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize th...
August 10, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Understanding the OASIS+ Cybersecurity...
OASIS+ is here! It will provide the first highly visible test of the contracting community’s response to the call for more rigorous cybersecurity. Read the requirements of OASIS+, and you’ll see that your company needs pre-award C-SCRM – proof of your cybersecurity compliance. These requirements are the same ones that are currently necessary for all government contracts and are equivalent to CMMC Level 1. What does that mean...
August 10, 2023
Organizer: DTS
Location: Webcast
Add Favorite
Quantum Speaker Series Presents: D-Wave...
This webinar will discuss the latest research on a class of intractable large-scale optimization problems on its AdvantageTM quantum system, which has 5,000+ qubits. Andrew will examine the recent collaborative research between D-Wave and Boston University and highlight how this marks a significant achievement for quantum technology, as it demonstrates a computational advantage over classical approaches.
August 1, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Securing Access to Data: An Exploration...
In today’s interconnected and rapidly evolving digital landscape, ensuring secure access to sensitive resources is of paramount importance. There are various methods of securing data and Federal agencies have explored a majority of them. Identity, Credential, and Access Management (ICAM) and Attribute-Based Access Control (ABAC) have emerged as two prominent frameworks that enable organizations to address the challenges associated with a...
July 20, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Breaking Down Data Silos: Leveraging Ad...
In today’s digital age, government organizations are collecting more data than ever before. However, many agencies are struggling to make sense of this data, which is often siloed across different departments, systems, and classifications. Enterprise-level data analytics offers a solution to this problem, allowing government organizations to break down data silos and gain a more comprehensive view of their operations. Join us as topic ex...
July 13, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
The AI Revolution in Government: How It...
As artificial intelligence (AI) applications proliferate across the internet ecosystem, other changes are being triggered, from the commitment to R&D funding to workforce development to new initiatives in higher education. The federal government’s spending on IT R&D and AI in fiscal year 2023 is estimated at $9.6 billion. Meanwhile, the University of Florida, for instance, declares it is “building an AI university,” a...
July 12, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search