Back to Search Begin New Search Save Search Auto-Notify
Zero Trust is Needed to Win the Cyber War
Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate. It has been almost two years since the Office of Management and Budget issued its federal zero trust architecture strategy, which set out specific goals for agencies to achieve b...
January 23, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
How State & Local Governments Can Secur...
State and local governments and education produce large amounts of unstructured data in a wide range of data types. From student report cards that contain personally identifiable information (PII) to municipal tax rolls full of information that fraudsters want to steal, these organizations have a data protection challenge on their hands. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educatio...
January 18, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Boosting Cybersecurity Power for State,...
Cybersecurity professionals working for state and local agencies and educational systems are likely already aware that cyber attacks targeting their organizations are increasing sharply – the second quarter of 2023 saw a 40% increase over the first quarter of the year. System defenders face the ongoing challenges of resource constraints, increasingly complex networks, and data overload. Add in emerging cyber threats from the accelerating...
January 17, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
After an Attack: Cyber Recovery Best Pr...
Recent headlines have been full of stories about state and local governments and school systems being targeted by malicious actors. And these organizations are likely to face tight budgets and limited manpower to deal with a cyber threat. For many agencies, the reality is it’s a matter of when – not if – they will be attacked. There are steps that can be taken to be better prepared to cope with the arduous task of recovery, m...
January 11, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Budgeting Ideas to Reach a Zero Trust Future
Ransomware, malware, phishing, DDoS, social engineering, zero-day exploit, botnets – the list of types of attacks out there is long enough to keep even the most seasoned cybersecurity expert awake at night. And with the increased use of remote computing, the cyber attack surface grows as more edge devices are added to networks. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity. In th...
January 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
State & Local Governments: AI Can Set a...
Machine learning and artificial intelligence already are playing a significant role in reworking call centers, in government agencies and private industry alike. Just picture the chatbots that show up every time you go to the online portal for the Department of Motor Vehicles, for instance, and get prompted to renew your auto registration online. To date, call center agents and customers both prefer human interaction. As generative AI (genAI)...
December 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Vision 2024: The Future of Technology i...
Government at all levels is moving as quickly as possible to integrate new solutions and overhaul processes that need streamlining. At the same time, officials are keeping close watch on AI and other emerging technologies, wary of the law of unintended consequences. For instance, in early September California Gov. Gavin Newsom signed an executive order directing state agencies to study the development, use and risks of generative artificial in...
December 7, 2023
Organizer: FedInsider
Location: San Jose, CA
Add Favorite
Talking Tech: Continuous Compliance for...
At the height of the pandemic in 2020, the Federal Employee Viewpoint Survey found that almost half of federal employees worked remotely. By the end of 2022, the same survey found that 14% of employees were working remotely and another 25% were teleworking at least three days a week. The sudden exodus from government office buildings shone a bright light on the significant challenges it posed to security compliance operations – a challen...
November 30, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Be Prepared: The Cyber Wild West is Sti...
Events on the world stage are also playing out in cyberspace. Nation-states continue their kinetic wars into internet realms, commit crimes such as financial and intellectual property theft, and pursue their global strategic goals hidden from view. Ransomware attacks are increasing again. It’s a tough time for cybersecurity professionals. “We’re seeing attackers cause bigger impacts with less skills. They’re also more b...
November 29, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Breaking the System into Tiny Little Pi...
The cybersecurity slogan for zero trust is a simple one: Never trust, always verify. This slogan fits into the Department of Defense mindset, which is always focused on how to reduce risk, but it’s a challenge to apply it to the federal government’s largest agency. An important tool in pursuing zero trust is to implement microsegmentation – partitioning a network into small, isolated sections to reduce the attack surface in e...
November 28, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search