Back to Search Begin New Search Save Search Auto-Notify
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
How to Apply DEIA to Your Programs, Pol...
Diversity, equity, inclusion and accessibility (DEIA) isn’t a new concept. However, the Biden Administration has made achieving DEIA goals a cornerstone of its agenda. The only problem is that there are numerous mandates, goals and policies all aimed at improving DEIA, which makes wading through the various directives difficult for overburdened agencies. Join us online Wednesday, Feb. 21 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from...
February 21, 2024
Organizer: GovLoop
Location: Webcast
Add Favorite
Understanding FedRAMP Compliance Webinar
Are you familiar with Federal Government programs for protecting controlled unclassified information? There is an increasing emphasis on enforcing the protection of sensitive data by government contractors through cybersecurity compliance programs that require implementation of the Federal Risk and Authorization Management Program (FedRAMP).Companies doing business directly or indirectly with the Department of Defense (DoD) must be aware of th...
November 9, 2023
Organizer: Executive Mosaic LLC
Location: Virtual
Add Favorite
FedRAMP Rev 5 and Beyond: Your Key to S...
Since its launch in 2011, FedRAMP has become the best practice for selecting, deploying, and managing cloud systems and applications in the U.S. Federal Government. And in January 2023, the FedRAMP Authorization Act made FedRAMP the law of the land! Now, Rev 5 of FedRAMP brings unprecedented levels of automation and continuous monitoring to this industry leading approach enabling faster submissions and authorizations. The key to these new leve...
November 9, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Partnerships in Cybersecurity Education...
Cybersecurity education and workforce development is a significant issue given large current national capability and skills gaps. In this webinar, we bring together key partners and major stakeholders from the public sector, private sector, and academia to discuss pathways of collaboration and partnerships moving forward to solving this important problem. Panel members will discuss their experience and “best practices” to reduce th...
November 7, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Red Hat featuring Forrester Research -...
Join Forrester and Red Hat for an insightful discussion on why the adoption of Red Hat® Enterprise Linux continues to gain traction as organizations consider their long term IT strategy. Over the past decade, Linux® has become the go to choice for IT departments. It has expanded beyond datacenter use cases to include cloud and edge deployments for those working to migrate workloads or modernize their IT environments. Enterprise Linux b...
October 31, 2023
Organizer: Red Hat
Location: Webcast
Add Favorite
Understanding the OASIS+ Cybersecurity...
OASIS+ is here! It will provide the first highly visible test of the contracting community’s response to the call for more rigorous cybersecurity. Read the requirements of OASIS+, and you’ll see that your company needs pre-award C-SCRM – proof of your cybersecurity compliance. These requirements are the same ones that are currently necessary for all government contracts and are equivalent to CMMC Level 1. What does that mean...
August 10, 2023
Organizer: DTS
Location: Webcast
Add Favorite
Protecting Critical Infrastructure with...
Modern cybersecurity measures such as post-quantum cryptography (PQC) and zero trust architecture (ZTA) are essential to protect U.S. critical infrastructure and ensure a resilient nation. And with a flurry of comprehensive initiatives coming from the Executive Branch, Pentagon, NSA, and NIST, it can be challenging for U.S. government CIOs and CISOs to determine where to prioritize resources. But PQC and ZTA aren’t mutually exclusive: ef...
June 22, 2023
Organizer: ATARC
Location: Virtual
Add Favorite
Cybersecurity Costs are Allowable: Prac...
You’re taking the necessary steps to achieve cybersecurity compliance and banking on the benefits to help you win future work. Which of these costs are allowable, and how will your organization account for and allocate them to your contracts? Derek Kernus, Director of Cybersecurity Operations at DTS, will help you answer that. In an in-depth conversation with Mike Tomaselli, a cybersecurity pro and accountant with Chess Consulting LLC, w...
June 8, 2023
Organizer: DTS
Location: Webcast
Add Favorite
ICIT Virtual Briefing | Cyber Snow Days...
Schools educate our nation's future so school administrators must navigate numerous challenges outside their control. With a reported 67 million malware attacks against education institutions during a typical 30-day stretch*, one major challenge is that K-12 institutions easy targets for cybersecurity attacks. These attacks have risen since the Covid-19 pandemic forced remote learning, and a new form of highly evasive adaptive threats (HEAT) u...
February 15, 2023
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search