Back to Search Begin New Search Save Search Auto-Notify
Protecting Privacy from the Ground Up
Privacy is an often-overlooked aspect of cybersecurity. With the growth of AI and evolving privacy legislation, however, state and local agencies will need to understand how to select and integrate technologies that not only meet compliance standards but also promote maximum privacy and trust. Overwhelmed with stories of hacks, attacks, and the prying eyes of private companies and public agencies, fatigued defenders may feel that even attempti...
January 19, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Think Like a Spy to Improve Your Cybers...
State and local governments, K-12 districts, and higher education institutions face two kinds of threats: (1) Trusted Insider threats and (2) ‘Virtual’ Trusted Insider threats. Trusted Insider threats are rogue employees using authorized access to do unauthorized acts. This can include theft of data and services, fraud, or even system destruction or theft of IP and trade secrets. Virtual trusted insider threats happen when an emplo...
January 17, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
2024 Predictions Report: Evolution Is t...
The term ‘evolution’ implies the gradual growth of something from simple to complex, and it perfectly sums up Arctic Wolf’s 2024 Cyber Threat Predictions. The predictions presented are based on current cybersecurity trends and insights gathered from our data, and trace the development of several trends based on their earlier, simpler iterations and anticipate which ones are poised to take significant steps forward in the year...
January 16, 2024
Organizer: FutureCon
Location: Webcast
Add Favorite
How Federal Agencies Can Take the Next...
It’s the age of AI. Artificial intelligence is everywhere, dominating headlines and conversations as AI and machine learning (ML) technologies advance at a rapid pace. Federal spending on AI has risen to record levels, and the Biden administration’s fiscal year 2024 budget seeks billions of dollars more, while AI-related legislation has increased exponentially in Congress. Federal agencies and mission partners are implementing AI-i...
January 9, 2024
Organizer: MeriTalk
Location: Webcast
Add Favorite
Understanding FedRAMP Compliance Webinar
Are you familiar with Federal Government programs for protecting controlled unclassified information? There is an increasing emphasis on enforcing the protection of sensitive data by government contractors through cybersecurity compliance programs that require implementation of the Federal Risk and Authorization Management Program (FedRAMP).Companies doing business directly or indirectly with the Department of Defense (DoD) must be aware of th...
November 9, 2023
Organizer: Executive Mosaic LLC
Location: Virtual
Add Favorite
Quantum Speaker Series Presents: Export...
Kaniah Konkoly-Thege and Ryan McKenney from Quantinuum will present on the export control landscape for quantum technologies. In October 2022, the Biden administration introduced semiconductor, artificial intelligence, and supercomputing-related export controls on China and has since made numerous public statements that similar restrictions on quantum technologies may follow. Existing U.S. quantum technology controls target specific end users,...
October 17, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
The Next Generation of the Government C...
How are government contact centers evolving to serve a new generation of citizens and residents? The President’s Management Agenda and rising consumer expectations have placed a renewed focus on improving experience to rebuild trust in government at all levels. At the heart of this work are improvements to the government contact center experience and operational efficiency. Agencies today are tasked with providing their customers with a...
September 21, 2023
Organizer: TD SYNNEX Public Sector
Location: Webcast
Add Favorite
Integration Using Salesforce and Sharepoint
Join sFiles®, Salesforce®, and Carahsoft® for a free webinar to explore the best ways to seamlessly take advantage of your existing SharePoint® storage directly from within your Salesforce® environment! In this webinar you’ll see first-hand how your users can collaborate on content directly in Salesforce®, while your organization’s documents are centralized in SharePoint® to streamline processes, engage...
August 24, 2023
Organizer: sFiles Government Team at Carahsoft
Location: Webcast
Add Favorite
Identity - One Critical Element of CISA...
When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as “an attribute or set of attributes that uniquely describes an agency user or entity,...
August 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Quantum Speaker Series Presents: D-Wave...
This webinar will discuss the latest research on a class of intractable large-scale optimization problems on its AdvantageTM quantum system, which has 5,000+ qubits. Andrew will examine the recent collaborative research between D-Wave and Boston University and highlight how this marks a significant achievement for quantum technology, as it demonstrates a computational advantage over classical approaches.
August 1, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search