Bringing 5G to the Battlespace
Fast, reliable, and secure communications is essential to success in the battlespace. The advent of the telegraph was a central part of Civil War strategy and tactics. Introduction of the radio was just as important in World War I, while radar and sonar – other forms of conveying crucial information – played an important role in World War II. Using 5G to facilitate communications in today’s combat settings is just as signific...
November 1, 2024
Organizer:
FedInsider Location:
Webcast
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
Emerging Technology Series: Cybersecurity
While developments in artificial intelligence may get all the headlines at the moment, it is just one more complication for the ever-evolving cybersecurity field. The Gartner top cybersecurity trends and strategies for 2024 reflect the wide variety of pressures cybersecurity professionals face, including the emergence of generative AI (GenAI) as a mainstream capability, the challenge of managing security risks in a constantly changing threat e...
November 6, 2024
Organizer:
FedInsider Location:
Webcast
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
From Data to Decisions: Secure Controll...
Explore the critical role of Multi-Enterprise Spanning Architecture (MESA) in helping to enable controlled collaboration and securing sensitive information across mission partners.
Innovation Summit: Riding the Wave of T...
While the IT universe has always been a rapidly evolving environment, it often has changed in an expected way – more speed, more capacity, less latency, for example, building on what came before. Occasionally, however, disruptive new technology or a major strategic shift in thinking is introduced and it takes a long time for the reverberations to be absorbed and the ecosystem to adjust to the new circumstances. Over the past three years,...
November 14, 2024
Organizer:
FedInsider Location:
Washington, DC
CyberSmart 2024: Cybersecurity Excellen...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
November 15, 2024
Organizer:
FedInsider Location:
Webcast
Transforming Government Customer Servic...
The Executive Order directing federal agencies to improve customer experiences (CX) and service delivery, issued in December 2021, directs agencies that, “Government must be held accountable for designing and delivering services with a focus on the actual experience of the people whom it is meant to serve. Government must also work to deliver services more equitably and effectively, especially for those who have been historically underse...
November 18, 2024
Organizer:
FedInsider Location:
Webcast
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
Probable Maximum Precipitation: What Is...
Join us on December 10, 2024, from 12:00 PM - 2:00 PM Eastern for Probable Maximum Precipitation: What Is It, How Is It Calculated, and How Do I Apply It? This webinar will provide detailed discussions related to the development of Probable Maximum Precipitation and its application for dam safety. Detailed information will be provided regarding the history of PMP development and its use in dam safety design, the current standard of practice fo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.