Back to Search Begin New Search Save Search Auto-Notify
ATARC's Federal Mobility Summit
Ensuring robust mobile security is critical in today’s digital landscape, particularly with the increasing reliance on mobile technology for sensitive tasks. This discussion will delve into key aspects of mobile security, including identity management, zero trust architectures, and emerging threats. Participants will gain insights into best practices for protecting mobile infrastructure, safeguarding user data, and mitigating risks assoc...
September 19, 2024
Organizer: ATARC
Location: Reston, VA
Add Favorite
Empowering Troops and Enhancing Awarene...
Private wireless is significantly impacting modern warfare, fundamentally changing how battles are fought. Join us as we explore the transformative power of private wireless networks for military operations. Discover how dedicated, secure communication infrastructure is empowering troops on the ground and revolutionizing situational awareness through real-time data sharing, improved sensor integration and advanced augmented reality.
August 7, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Zero Trust in Action: Approaches to Mob...
Government agencies increasingly rely on mobile devices, making endpoint security crucial. This panel features government officials discussing innovative strategies to address mobile cyber threats within a Zero Trust framework. Learn how mobile security is vital to enhancing the effectiveness of a Zero Trust Architecture, providing stringent verification mechanisms to ensure the integrity of user and device access to critical resources. From i...
June 27, 2024
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Sponsored Content: FEDERAL FORECASTING...
Sponsored Content WebinarDV SOLUTIONS During this webinar, we'll highlight the following key points: Partnerships: We are inviting Primes, Apex Accelerators, Chamber of Commerce’s, Small Business Organizations and SMEs to partner with the Federal Forecasting App. Category & Subcategory Management: Partners would have their own dedicated categories & subcategories. Partners would have access to push notification features, current...
March 12, 2024
Organizer: Jennifer Schaus & Associates
Location: Webcast
Add Favorite
DoD Investing in the Future of 5G
Communications security is one of the foremost priorities in any battlespace. This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly. Its ability to handle massive amounts of data makes it a crucial component in real-time data collection from all sources,...
October 20, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Zimperium- How Hackers Bypass MFA ... A...
Multi-factor authentication (MFA) is a key component to achieving Zero Trust, as it adds a secondary line of protection before allowing access to networks, applications, or databases. However, malicious actors have found ways to bypass this control through sophisticated SMS-based attacks, device compromises, malware and even network attacks. Join Zimperium and RSA for a discussion on how advanced mobile threat defense (MTD) solutions, either s...
March 23, 2023
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
See a Demo of Zimperium MTD | Plus a De...
On board with Mobile Threat Defense, but interested in seeing more on the day-to-day detail of how it will impact your mobile security? Join a member of the Zimperium Sales Engineering team for a demo of the core aspects of zIPS, our advanced mobile threat defense (MTD) solution. Attend to ask questions and learn about: Policy setup and enforcement Integrations with MDM / EMM, XDR, SIEM and SOAR solutions Alerts and managing risks Special high...
March 7, 2023
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Google 2022 Mobility Summit
Modern productivity means getting work done whenever and wherever needed. The evolution of mobile devices and networks has enabled agencies to accomplish more. Mobility has also brought together an ecosystem of interconnected networks, operating systems, mobile applications, cloud services, and data. This, coupled with efforts to shift towards zero trust architectures, requires agencies to be more diligent than ever in how they adopt and imple...
October 26, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
Back to Search Begin New Search