Back to Search Begin New Search Save Search Auto-Notify
Unlocking Modernization with AI Managem...
Many government agencies wrestle with their legacy systems and outdated processes every day, especially when it comes to cybersecurity and data flow. Agencies usually have multiple servers, private or hybrid clouds, and thousands of end points, from desktop computers to smart phones, tablets to sensors, generating millions of bits of data. An army of data analysts wouldn’t be able to keep up with the volume of logs being generated (and n...
November 8, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Generative AI in Government
It is hard to believe that ChatGPT isn’t even a year old yet, when you look at the tidal wave of new apps that have been released in its wake. After decades where the phrase “artificial intelligence” was sufficient, commentary in the public sphere has already moved to the next level – generative AI. What’s the difference? As Forbes describes it, “Traditional AI systems are primarily used to analyze data and...
November 7, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Cyber Resilience 2023 - Day One: How to...
Ever since the dawn of the internet, its value lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. Even hostile nation-states such as North Korea seek U.S. and state agencies’ data because they ne...
November 1, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Meeting the Requirements of a Mixed IT...
Agencies today are faced with the challenge of modernizing legacy IT solutions to streamline workflows and increase the speed and quality of their services. But the push toward standardization must also take into account that people do their best work when they have the best tools. Join thought leaders in government and industry to discuss how Apple devices are changing the IT landscape from one of mandates to one of choice. We’ll explor...
October 18, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
How to Fight Threats to the Software Su...
After several high-profile cyber incidents resulting from exploited vulnerabilities, the Office of Management and Budget released a memorandum (M-22-09) in 2022 that requires agencies to adopt a Federal Zero-Trust architecture. This new architecture includes a key element: requiring agencies to meet specific cyber standards, including application security testing, by the end of 2024. Two elements of modern software are growing in importance fo...
September 14, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Vision 2023: Transforming Ohio Through...
The technology revolution that has reshaped consumer markets has now arrived at the state level. Case in point: the State of Ohio, where state, local and educational organizations are moving quickly to integrate innovative technologies that can drive better decision-making while lowering the cost of ownership for IT systems. Incorporating new technologies also creates opportunities to reimagine the future workforce, for both the public and pr...
August 24, 2023
Organizer: FEDINSIDER
Location: Columbus, OH
Add Favorite
Powering Innovation Through Technology,...
The spread of 5G – fifth-generation mobile communications – across all levels of government is being accelerated by its usefulness in high-speed data transmissions and flexibility in customizing network applications. And the range of applications by government agencies made possible by 5G may only be limited by one’s imagination. Some of the innovations supported by this wireless standard were born out of necessity – at...
August 17, 2023
Organizer: FEDINSIDER
Location: Reston, VA
Add Favorite
The Urgency of API Security
Cybersecurity professionals are well aware that the threat landscape they live in is volatile and poses ever-changing threats to the systems they defend. One kind of risk is exploding – attacks on APIs. APIs are such attractive targets because their purpose is to allow two or more applications to communicate with each other. Infecting an API drastically expands the attack surface, but most enterprises do not have transparency into their...
August 15, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Stays Front-of-Mind in 2023
Federal agencies have taken the lead in the public sector’s adoption of cloud computing. It has provided many benefits, including flexibility for applications, cost savings as legacy systems have been phased out, and empowering customers in their interactions with agencies – but it also has opened new methods for cyberattacks, such as corrupting elements of the software supply chain. As a result, data protection is more important t...
July 31, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How to Increase Government IT Agility
Government IT is faced with constantly evolving mission demands, limited resources, stringent compliance requirements, and always increasing customer expectations. Agencies increasingly recognize the importance of implementing scalable and secure cloud strategies to meet these challenges.Many agencies’ IT departments are learning that when teams are provided access to a configurable, no code/low code application platform, initiatives can...
July 26, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search