Agency in Motion: DISA's Hybrid Workfor...
The Defense Information Systems Agency is, in many ways, the point of the cyber spear for the Department of Defense. It’s responsible for conducting network operations across all of DOD’s warfighting domains to ensure warfighters’ effectiveness and lethality.Maintaining that sharp edge during the pandemic has required DISA to adjust and evolve its own operations while assisting Defense agencies to ensure their operations cont...
November 15, 2021
Organizer:
FEDINSIDER Location:
Webcast
A Government Guide to Zero Trust | Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Executive Order includes directives to CISA and GSA to develop a cloud security strategy and provide guidance to agencies for implementation.Address...
November 10, 2021
Organizer:
FEDINSIDER Location:
Webcast
"Frauditing" Internal Controls for Frau...
"How to prevent and detect corporate fraud!!" Under COSO 2013, Principle 8: "The organization considers the potential for fraud in assessing risks to the achievement of objectives". Corporate fraud is more prevalent today than ever before. Layoffs, pressures, incentives, anonymity, computerization, and lack of privacy are all contributing factors. This CPE event is focused on presenting the internal controls to fraud prevention and detection....
Cyxtera Federal Open House
This exclusive Open House Event is for existing and future Federal customers, as well as partners. Tour our cloud-smart, enterprise-grade facility and learn more about our FedRAMP-ready Cyxtera Platform for Government. Learn how we’re enabling agencies to adhere to cloud-smart mandates while optimizing their IT spend with our custom on-demand infrastructure and interconnection solutions. Network with your peers over beers and BBQ and mee...
A Government's Guide to Zero Trust Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Cybersecurity and Infrastructure Security Agency views this as setting an example for state and local governments looking to strengthen their securi...
November 9, 2021
Organizer:
FEDINSIDER Location:
Webcast
FCW Summit: CDM
The Continuous Diagnostic and Mitigation (CDM) program has matured and broadened its offerings and full deployment of agency dashboards is on the horizon. In the last year, however, ominous high profile breaches in commercial and critical infrastructure networks have highlighted the continued importance of strong cybersecurity across federal networks. In the wake of the pandemic, federal IT managers are faced with an increasingly complex cyber...
Modernizing Government's Distributed Wo...
Governments everywhere and at all levels should be applauded for finding ways to meet their citizens’ needs during the pandemic. While many agencies had continuity-of-operations plans in place, no one imagined that every agency would have to act on them at the same time. What made it possible, of course, was the rapid spread of cloud-based technology that enabled government employees to work from their own homes, frequently using their o...
November 4, 2021
Organizer:
FEDINSIDER Location:
Webcast
5 Cybersecurity Trends You Need to Know...
Not only does October signal the start of fall (and spooky season), but it’s also Cybersecurity Awareness Month! At FormAssembly, we know there’s nothing scarier than feeling unprepared to handle the slew of cybersecurity risks and threats that happen on a daily basis. If your organization struggles to maintain a strong stance on cybersecurity, you could be exposing your entire business model to tangible security and data privacy...
Elevating the Federal Cybersecurity Dis...
Time and time again, data breaches demonstrate the pitfalls of relying on detection to identify malicious activities taking place on the network, rather than prevention of the threat in the first place. The emphasis—post event—has been what the agency did wrong. But, what if we took a different approach that allowed agencies to share what has been working for them? Both before and after. Some tips and lessons from folks who have be...
How Intelligent Automation Is Helping H...
In the iconic “Star Trek” – whether the TV series of the 1960s or the two-movie adaptations over the past 40 (!) years – Dr. McCoy uses a handheld scanner to examine, diagnose, and treat his patients. What “Star Trek” doesn’t show is the vast amount of machine learning (ML) and artificial intelligence (AI) that culminated in the creation of the scanner’s capabilities. Though this level of compute...
October 28, 2021
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.