Continuous Diagnostics and Mitigation (...
The Continuous Diagnostics and Mitigation (CDM) program is a way government agencies move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to provide government agencies with risk-based cybersecurity solutions to protect federal civilian networks across organizational tiers. Specifically, CDM helps federal agencies identify cybersecurity risks, prioritize those risks, and enable staff to focus on those prior...
Update: Continuous Diagnostics And Moni...
The Continuous Diagnostics and Mitigation (CDM) program is the way government agencies move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to support government-wide risk-based cybersecurity solutions to assist participating agencies improve their security posture consistently and cost-effectively. In this virtual workshop, government & industry experts will provide the following: a status update on CD...
How to Quantify the ROI of your Data St...
Are you getting more time back than you put in with your analytics project? How long does it take to onboard a new dataset? Who views what dashboards and for how long? These, and other questions will better help you understand the value of the data and analytics routinely put together on projects. Often, these questions will unlock different understandings of what is extremely valuable and what may not be important at all, not just from the im...
Embracing Strategic Portfolio Management
Enter the newly created Strategic Portfolio Management market research area that has elevated IT Portfolio Management to a higher level. This presentation will talk about the changes organizations and agencies will face in order to realize the value from being strategic in their actions, their responsibilities, and the continuous monitoring of strategic portfolios. From the senior executives to the data stewards, this session will outline how...
Ascending the Summit to Enhance the Cit...
Across the country, governments are putting a stronger emphasis on digital services. With more and more citizens online and eager to communicate digitally, federal, state, and local governments must rise to the occasion. Join us for this session as we explore how agencies can transform the digital citizen experience to enhance speed, flexibility, convenience, and personalization of government services. You’ll learn about: What citizens t...
Zero Trust Implementation Case Study
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include guidance for zero trust architectures. This virtual workshop will focus on actual Zero Trust implementations, and the associated lessons learned.
Zero Trust: The Fundamentals
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
FOIA Automation
Since 1967, the Freedom of Information Act (FOIA) has provided the public the right to request access to records from any federal agency. Federal agencies are required to disclose any information requested under the FOIA, unless it falls under one of nine exemptions which protect interests such as personal privacy, national security, and law enforcement. In recent years, federal agencies have been inundated with FOIA requests creating challeng...
The Fundamentals of Cloud Security
Government wide pressure to reduce IT costs and optimize operations has led many agencies to embrace cloud computing. Despite the potential savings and improved efficiencies, securing the cloud remains a major concern. Cloud Computing Security can be defined as defending the confidentiality, integrity, and availability of agency assets (data, applications, infrastructure) using cloud services from both outside and insider threats. Securing the...
Using Social Media to Enhance Customer...
Social media allows for the personalization of content and delivery to citizens worldwide. This resource is exactly what government agencies need as they navigate the modernization of their processes and technologies. As 2021 came to a close, the Biden administration issued an Executive Order on Transforming Federal Customer Experience and Service Delivery to Rebuild Trust in Government, which includes “modernizing programs…and pi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.