Best Practices for a Zero Trust Approac...
Old-school perimeter-based security relies on separating the "bad guys" from the "good guys." Zero Trust assumes that the bad guys are already in your network and have access to your applications and systems. Zero Trust works on the principle "never trust, always verify.” Join us to learn best practices on how organizations will continue implementing Zero Trust architectures. While Zero Trust is a strong approach to addressing modern cyb...
Forrester Total Economic Impact: Forcep...
Forcepoint’s Raise the Bar-compliant Cross Domain suite is in operational use in some of the most stringent environments in the world, securing global missions efficiently and effectively while providing a high degree of usability, without compromising security. Forrester Consulting presents key challenges a Department of Defense intelligence agency encounters and how the implementation of a Forcepoint cross domain solution can provide c...
September 22, 2021
Organizer:
Forcepoint Location:
Webcast
AI Engineering: Ask Us Anything About B...
Self-driving cars are being tested in our cities, bespoke movie and product recommendations populate our apps, and we can count on our phones to route us around highway traffic... Why, then, do most AI deployments fail? What is needed to create, deploy, and maintain AI systems we can trust to meet our mission needs, particularly for defense and national security? The SEI recently launched an AI Division to ensure that our researchers are worki...
September 22, 2021
Organizer:
CMU - SEI Location:
Webcast
Securing the Hybrid Office
This summer, the Department of Defense Office of Inspector General released an eye-opening report warning services about a new threat to printing. The report examined additive manufacturing systems, but the concerns it raised are not unique to 3D printing alone. PCs, laptops, and mobile devices get most of the attention during endpoint security discussions, but others -- like printers -- are just as important. Too many organizations do not pro...
FCW Workshop: Electronic Records Management
Federal agencies must shift fully to electronic records management by December 2022, when the National Archives and Records Administration will stop accepting new paper records. Successfully making that transition entails far more than simply digitizing existing documents. Meeting the goals set by M-19-21 demands changes to current business processes, dramatically different approaches to content classification, new systems that are digital thr...
govDelivery Administrator Training Webinar
We offer weekly live training sessions for the most commonly used features in govDelivery. These training sessions last roughly one hour and are conducted by a member of our Training Team. Using Zoom, you'll be able to view the computer screen of our training leader as they walk you through important tasks and functions within govDelivery. If you register for a session, but can't attend, that's OK! Please feel free to sign up for another sessi...
September 21, 2021
Organizer:
Granicus Location:
Webcast
High Tech Marketing in the " New Normal"
Struggling to keep your business development going in the "New Normal"? Jon Evans, Strategic Account Director for Lumen Technologies, has answers for you! He is a multiple time Presidents Club winner with a solid record of success driving business development across all product portfolios, solving critical customer business initiatives, while working with Fortune 15 industry leaders across multiple verticals effectively.
FCW Workshop: Emerging Tech
Emerging technologies have always offered the promise of better, faster, cheaper processing and problem solving, but they also bring a host of challenges with them, from security and operational issues to privacy concerns. The past year has also shown that necessity remains the mother of invention, as agencies moved to adapt technology to remote workplace models, as well as roll out new services and capabilities demanded by the pandemic. Where...
5G Futures
The changing landscape of national security continues to evolve and shape the communication tools both communities and federal government workers rely on every day. From fiber optics to foreign influences, the factors influencing information sharing are as plentiful as they are complex, and will undoubtedly continue to be a contentious topic of discussion. In this third installment of our 5G Futures series, join Nextgov, Defense One, and Route...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.