185 past events found
+ 4 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
ATARC'S 2023 CIO Summit: Leading Tomorr...
A collection of presentations covering various topics including: Evolution of IT Leadership: Navigating Technological Transformation Strategic Planning for Resilience: Federal Leaders’ Response to Cybersecurity Challenges Data-Driven Governance: Leveraging Analytics and AI for Informed Decision-Making Federal IT Leadership in 2024 and Beyond: C-Level Strategies and the CIO’s Role
December 13, 2023
Organizer: ATARC
Location: Washington, DC
Add Favorite
Quantum Speaker Series: Migration to Po...
Initiating the development of practices to ease migration from the current set of public-key cryptographic algorithms to replacement algorithms that are resistant to quantum computer-based attacks. Open Q&A discussion.
December 5, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
ATARC Cybersecurity Higher Education ...
The Cybersecurity Higher Education and Workforce Development Working Group’s vision is to build a collaborative framework of educators, industry, and government to provide strategic recommendations on enhancing national cybersecurity education and workforce development. The group will recommend policy, best practices, and tools for the implementation of innovative and comprehensive national career pathways at all levels of education as w...
December 1, 2023
Organizer: ATARC
Location: Virtual
Add Favorite
State and Local Cyber Grants Working Gr...
Join ATARC's State and Local Cyber Grants Working Group bi-weekly, Thursday morning meeting. For more information on ATARC Working Groups, contact Elizabeth Wyckoff at ewyckoff@atarc.org. The post State and Local Cyber Grants Working Group Meeting appeared first on ATARC.
November 16, 2023
Organizer: ATARC
Location: Virtual
Add Favorite
Partnerships in Cybersecurity Education...
Cybersecurity education and workforce development is a significant issue given large current national capability and skills gaps. In this webinar, we bring together key partners and major stakeholders from the public sector, private sector, and academia to discuss pathways of collaboration and partnerships moving forward to solving this important problem. Panel members will discuss their experience and “best practices” to reduce th...
November 7, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
A Look at Evolving Insider Risk Programs
Insider Risk Programs have continued to evolve naturally over the past 20 years. They have grown exponentially beyond the traditional lens of trying to identify spies through cyber-focused data exfiltration events. Today, Insider Risk Programs have expanded to include internal HR, legal, and compliance stakeholders within organizations and have expanded security beyond strictly physical and cyber domains to now include analysts, investigators,...
October 24, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Identity Governance; A Critical Enabler...
Office of Management and Budget (OMB) Memorandum M-22-09 requires “agencies to achieve specific zero trust security goals” and designates “Identity” as the first of five pillars from CISA’s zero trust maturity model. Additionally, M-22-09 provides specific actions for the Identity pillar that include, employing centralized identity management systems that integrate with agency applications and platforms; leveragin...
October 5, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Zero Trust: Driving Transformation and...
Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize th...
August 10, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Securing Access to Data: An Exploration...
In today’s interconnected and rapidly evolving digital landscape, ensuring secure access to sensitive resources is of paramount importance. There are various methods of securing data and Federal agencies have explored a majority of them. Identity, Credential, and Access Management (ICAM) and Attribute-Based Access Control (ABAC) have emerged as two prominent frameworks that enable organizations to address the challenges associated with a...
July 20, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search