Back to Search Begin New Search Save Search Auto-Notify
Protecting Critical Infrastructure with...
Modern cybersecurity measures such as post-quantum cryptography (PQC) and zero trust architecture (ZTA) are essential to protect U.S. critical infrastructure and ensure a resilient nation. And with a flurry of comprehensive initiatives coming from the Executive Branch, Pentagon, NSA, and NIST, it can be challenging for U.S. government CIOs and CISOs to determine where to prioritize resources. But PQC and ZTA aren’t mutually exclusive: ef...
June 22, 2023
Organizer: ATARC
Location: Virtual
Add Favorite
How The Government Can Stay Ahead of Sp...
In the digital age, government agencies face increasing threats from spyware that can compromise sensitive information and undermine national security. To combat this, many government organizations are taking proactive measures by implementing executive orders and directives to ban specific applications on their mobile devices. However, this approach presents challenges in terms of scalability, visibility, and keeping up with rapidly evolving...
June 15, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Cybersecurity Costs are Allowable: Prac...
You’re taking the necessary steps to achieve cybersecurity compliance and banking on the benefits to help you win future work. Which of these costs are allowable, and how will your organization account for and allocate them to your contracts? Derek Kernus, Director of Cybersecurity Operations at DTS, will help you answer that. In an in-depth conversation with Mike Tomaselli, a cybersecurity pro and accountant with Chess Consulting LLC, w...
June 8, 2023
Organizer: DTS
Location: Webcast
Add Favorite
Streamlining Security Authorization Thr...
Federal agencies must undergo the complex and laborious process of security authorization to operate (ATO) for each information system (IS) in accordance with the Federal Information Security Modernization Act (FISMA). Currently, most agencies rely on manual documentation processes. These include popular productivity tools to capture the applicable security controls and the status/plans of implementation of the controls for each IS as well as...
June 1, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Cyber Resilience for Modern, Agile, and...
Today’s cybersecurity threat landscape means Federal professionals must take a proactive and practical approach to defending agency personnel, systems, networks, and data. IT infrastructures need resiliency that is built in, understood by the workforce, and prepared to work beyond the next threat. Creating a resilient IT architecture is not an admission of anticipated defeat. Rather, it’s insurance against probable events and incid...
May 25, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Accelerating Zero Trust with Complete I...
To advance Zero Trust mandates, federal IT leaders need an accurate, trusted, and complete picture of their entire IT estate. Attend this webinar to learn how your agency can better comply with OMB’s January 2022 memo, M-22-09, Moving the U.S. Government Toward Zero Trust Cybersecurity Principles. Attendees will hear how to develop a real-time situational awareness and understanding of everything on their networks, whether they are based...
May 18, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Navigating cATO Challenges in the Feder...
Join our thought leadership webinar to learn about the current operational challenges that federal agencies face on their journey to cATO and how to address them effectively. In this session, we’ll delve into the common challenges of proving compliance, vulnerability management and reporting, and assessing control effectiveness. We’ll provide real examples into best practices to address those challenges. Our panel of experts will p...
May 11, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Tackling the Challenge of Operational T...
Cybersecurity is usually framed in terms of IT – from malware to phishing to ransomware, federal agencies are paying attention to securing their networks and endpoints. But leaders often overlook security measures for operational technology (OT) and industrial control systems (ICS), such as building automation systems, physical access control systems, physical environment monitoring systems, and implementing a zero trust architecture. In...
April 18, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The DoD CUI Explainer Series: CMMC, The...
Our plain-language cybersecurity series continues with CMMC. You’ve heard the rumors and the myths, now cut through the hype and understand how the Program will really work. Knowing what CMMC Level your organization will need and what assessors will be looking for can help you create a strong cybersecurity stance that meets all the standards and keeps your business protected from new or evolving attacks. Derek Kernus, a Certified CMMC Pr...
March 28, 2023
Organizer: DTS
Location: Webcast
Add Favorite
Think Like a Hacker: Tactics to Identif...
Earn 1.5 CPE Credits on this webinar. Cybersecurity is one of the largest concerns facing businesses today and hackers continuously develop diverse ways of penetrating your cybersecurity defences. By adopting the mindset of a hacker, you can be one step ahead of malicious attacks and improve your cybersecurity infrastructure. On this CPE webinar our panel of experts will address how and why security gaps arise in IT security posture, and provi...
March 16, 2023
Organizer: Executive IT Forums
Location: Webcast
Add Favorite
Back to Search Begin New Search