Back to Search Begin New Search Save Search Auto-Notify
5G: The Transformation of Defense Networks
In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD...
October 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Applying AI to Advance Agency Missions
Artificial intelligence is becoming increasingly useful in applications throughout the federal government. Officials such as Federal CIO Clare Martorana and Deputy Secretary of Defense Kathleen Hicks speak about its significance in improving customer experiences and rapid returns on investment within DoD. Virtually every federal agency is actively engaged in AI projects. For instance, the departments of Justice and State, as well as the Center...
October 11, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
The Hard Truths of Data Security in the...
The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. On top of that, sensitive data – whether personally identifiable information, financial, intellectual property, etc. – can be scattered throughout the data ocean. In 2022, more than 200 government ag...
October 10, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Moving Customers to the Front of the Di...
Digital transformation has been a central premise of government at all levels tackling the job of ending reliance on legacy technology, upgrading systems and expanding services. Until recently, transformation efforts at the federal level focused on “lift-and-shift,” updating their digital systems or processes to make them better or more innovative, but they didn’t have the customer or end user or employee in mind while doing...
October 5, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Barbarians at the Gate: Zero Trust, Act...
As agencies move to implement a zero trust architecture, the dispersed nature of their cloud-based and hybrid networks means more attention than ever must be paid to the security of Active Directory (AD), which administrators use to manage permissions and access to network resources by far-flung endpoints. Attackers can gain unauthorized access to a company’s data if Active Directory is compromised; monitoring your AD will help protect s...
October 4, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
AI: The Power to See Earth's Changes IR...
Seeing changes in the physical features of the earth historically has taken eons – sometimes literally, as in identifying the shifting of Earth’s tectonic plates and the drift that created the continents as we know them. But the advent of satellites, drones, sensors and other technologies provides a constant flow of data that accurately reflects the conditions that societies encounter today. In 2017, the Department of Defense creat...
September 28, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Breaking the System into Tiny Little Pi...
The cybersecurity slogan for zero trust is a simple one: Never trust, always verify. States, localities, tribes and territories face the same cyber threats as the federal government, and many of their agencies are wrestling through how they can implement zero trust architectures. One of the most important elements in pursuing zero trust is implementing microsegmentation — partitioning a network into small, isolated sections to reduce the...
September 27, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Who Are You - and Can You Prove It? Ide...
One of the foundational tenets of zero trust architecture is Identity – providing credentials for every person and device – in order to manage access to government systems, whether entering from the outside or moving laterally from within. In other words, identity, credential and access management (ICAM) should be addressed as a whole, not as separate point solutions. This applies across all systems, all platforms, and all environm...
September 20, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Trusting Leaders in a Zero Trust Environment
As State and Local agencies pursue their zero trust goals taking into consideration the Executive Order 14028, “Improving the Nation’s Cybersecurity,” it is easy to focus on technology solutions. But that overlooks something fundamental about both the challenge and the purpose of moving to zero trust – the human beings that will use the redesigned systems to better meet their agency’s mission. If a zero-trust impl...
September 19, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search