Emerging Technology and Modernization Summit
New, exciting and transformative technologies have the potential to reshape how the government fulfills its mission. Emerging technologies have been born both out of long-standing challenges to government operations and in reaction to shifting priorities and citizen demand. Continuing cloud migration and management, more potent cybersecurity and supply chain risks, budgeting, as well as evolving remote work environments, all play a part in inc...
Zero Trust Workshop
Faced with challenges in everything from automation and modernization to the hybrid work environment, today’s IT leaders mitigate risk by adopting the latest zero trust security solutions to secure their endpoints and protect their systems. While recent guidance from the cyber executive order, NIST’s updated security risk framework, and CISA's Zero Trust Maturity Model offer a clear and strategic playbook for leaders, challenges re...
Intelligence and Insider Threats: Explo...
Driven by technological innovation and rising international uncertainty, today’s Intelligence leaders face complex challenges in identifying and addressing insider threats to their organizations. Though not always malicious or intentional, such vulnerabilities can cripple a company’s infrastructure, causing significant monetary loss, compliance difficulties, or broader reputational collapse. Amidst this confusing landscape marred b...
Managing Government's Risk at Scale
As NASA moves forward with its Moonshot, NASA SEWP is continuing its exploration of Supply Chain Risk Management (SCRM) and Cybersecurity Supply Chain Risk Management (C-SCRM). As one of the largest providers of technology equipment and services to government, NASA SEWP is in a unique position to bring leaders together for conversations about the latest developments and guidance, as well as innovative approaches that agencies are taking to pro...
The Results Are In: Key Trends in Feder...
The advancement of cyber threats, sharp increases in supply chain attacks, and widespread compromise of privileged credentials pose persistent risks to government agencies. Without a one-size-fits-all approach and a multitude of applicable technologies and areas to invest, leaders are left juggling cyber tools and competing frameworks in hopes to find the right approach for their agency – both in implementation and financing. Afterall, i...
How to Combat the Inevitable Breach: Bu...
The networks of today are a complex, hybrid mix of cloud and on-premise resources being accessed by users globally from a myriad of devices. This has significantly increased the attack surface which must be defended. While efforts are continually made to prevent breaches, modern organizations assume breach and seek to minimize breach impacts. Finding innovative, adaptive security measures, like micro-segmentation, is key to ensuring an organiz...
Emerging Tech Summit
New, exciting, transformative technologies are emerging that have the potential to reshape how the government fulfills its mission. Mass telework and communication tools, and the dynamic infrastructure like cloud and software-defined networks that support those tools, are making it possible for federal agencies to work in new ways. At the same time, advances in supercomputing, artificial intelligence and machine learning, and big data collecti...
The Future of Collaboration Technology
Collaboration, and the security that must support it, is a huge priority for all federal government agencies given the uncertainty of the pandemic. Although it's clear that the workforce must be able to work remotely, agencies are at different stages of embracing secure collaboration tools. How can agencies accurately assess their continuity of operations readiness in the event of another disruptive event? What should I be prepared for during...
How CISA can help defend your data
The frequency and ferocity of ransomware attacks grew steadily throughout 2021, prompting the federal government to accelerate both defensive and educational efforts. The Cybersecurity and Infrastructure Security Agency, which is part of the U.S. Department of Homeland Security, is a valuable resource for not just federal agencies, but state and local government organizations as well. In this webcast, GCN Editor-in-Chief Troy Schneider will ex...
Evolving at the Pace of Cyber Threats
Cybersecurity was already an acute challenge for government leaders, with high profile data breaches and ransomware attacks costing organizations millions of dollars and eroding trust with the public they serve. Since the beginning of the pandemic, as the workforce became more distributed and internet-facing technologies became core to continuity of operations, cybersecurity is key to meeting government’s essential mission. In a world wh...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.