Back to Search Begin New Search Save Search Auto-Notify
How Digital Playbooks Propel Federal Mo...
Successful federal modernization requires an artful blend of people, process, and technology—with a relentless focus on enabling business transformation. A “digital playbook” can provide a comprehensive guide to the process, describing both overarching strategy and tactical approaches. Using a templatized technology strategy can boost mission outcomes while humanizing data-driven modernization and leveraging artificial intell...
April 25, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Operationalizing Zero Trust: Securing C...
In the rapidly evolving landscape of cybersecurity, the Zero Trust model has emerged as a cornerstone principle, dictating that trust must never be implicit and must be continually earned. This webinar, “Operationalizing Zero Trust: Securing Containers in Runtime,” delves into the practical applications of Zero Trust architecture within live container workloads, an area fraught with potential vulnerabilities and attack vectors. Joi...
April 4, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Cloud Architecture Matters: Improve Clo...
As agencies increasingly migrate their workloads to the cloud, it is crucial to understand the implications and benefits of writing natively to the cloud, which enables organizations to optimize their data protection strategies, streamline operations, and enhance overall security. “Writing natively” is about building, deploying and managing software apps in the cloud computing environment. Taking this approach makes it possible to...
March 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust: In Depth
Federal departments and agencies are making headway in meeting the requirements of Executive Order 14028, issued in May 2021, to strengthen their cybersecurity by implementing a zero trust architecture. To date, many agencies have made progress in areas like identity management and secure access. But the journey toward achieving a zero trust environment is different for every department. The challenges that civilian agencies must overcome are...
March 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Election Security: Protecting the Found...
It has become clear over the past several years that maintaining U.S. election integrity is not just a single agency’s responsibility. Conducting fair and accurate elections is the responsibility of each state and territory. Meanwhile, nation-states, partisans, and scammers can interfere with voter information, try to cast doubt on election outcomes, and spread disinformation across social media, to name just a few. The Office of the Dir...
March 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Unlocking Your Agency's Data Treasure T...
Federal agencies collect vast amounts of data that often goes untapped because unlocking its full value is complex. But as agencies move to comply with the White House Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, harnessing the potential in their own data can help meet the EO’s objectives. Agencies can facilitate the use of AI by using their data to train custom large language model...
March 19, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
The Use of Artificial Intelligence (AI)...
On January 9, 2024, the ATARC Insider Risk Working Group conducted its first webinar on the use of Artificial Intelligence (AI) in Insider Risk Programs. During that webinar, panelists explored the use of AI as a critical tool in support of Insider Risk programs in Government, Industry, and Academia. In the second part of this conversation, panelists will discuss Culture, AI, and Insider Risk, and how and why to use AI in Insider Risk Programs...
March 19, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
March 13, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search