323 past events found
+ 3 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
O-RAN - the Next Step for 5G
Advances in telecommunications capabilities are a major driver in Department of Defense programs. From creating secure private networks that U.S. military forces and their partners can use in conflicts to integrating 5G capabilities to create “smart” warehouses to significant improvements in supply chain logistics, DoD has been committed to investing in rethinking the meaning and applications of communications. One of the next step...
October 27, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
NextGen Virtual Summit: Skill Sets for...
NextGen Virtual Summit: Skill Sets for the Modern Public Servant Wednesday, Oct. 25, 2023 10 a.m. ET/7 a.m. PT – 4 p.m. ET/1 p.m. PT Registration is open to everyone and there is no fee to register or attend. Attendees can earn up to 5 CPE credits.
October 25, 2023
Organizer: GovLoop
Location: Webcast
Add Favorite
5G: The Transformation of Defense Networks
In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD...
October 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Growing Good in Government by Building...
In an era where rapid technological advancement is reshaping industries, the public sector stands at a pivotal juncture. The Growing Good in Government Initiative (G3I) emerges as a beacon for this transformational journey, striving to usher federal agencies into the age of digital and artificial intelligence. This panel discussion delves deep into the heart of G3I, unpacking its strategic objectives, the role of self-organized teams, and the...
October 3, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Who Are You - and Can You Prove It? Ide...
One of the foundational tenets of zero trust architecture is Identity – providing credentials for every person and device – in order to manage access to government systems, whether entering from the outside or moving laterally from within. In other words, identity, credential and access management (ICAM) should be addressed as a whole, not as separate point solutions. This applies across all systems, all platforms, and all environm...
September 20, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Be More Productive With Automation
Given that there are only 24 hours in a day, what could you accomplish if you weren’t stuck doing low-value, repetitive stuff that eats away at your time? Probably a lot more. That’s where automation could be your biggest ally. Join us online Wednesday, Sept. 20, from 2-2:50 p.m. ET/11-11:50 a.m. PT to learn from government and industry leaders about how automation can help increase your productivity and that of your workforce.
September 20, 2023
Organizer: GovLoop
Location: Webcast
Add Favorite
Building A Better Case Management System
For government agencies, case management – delivering services to people and businesses – is the heart of their mission. In almost all cases, however, case management systems have gotten more complicated, more difficult to manage, and more expensive. Agencies today depend on legacy, siloed systems that have changed through kludges, “an ill-assorted collection of parts assembled to fulfill a particular purpose.” Rip-and-...
September 12, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Encryption Export Controls
U.S. export controls on hardware and software using encryption remain one of the areas that can confound even the most experienced export compliance practitioner. This webinar will go through the basics of classifying items that could fall within Category 5 Part II of the Commerce Control List. We will also review export licensing requirements for these items, including NLR and License Exception ENC. Designed for individuals with a working kno...
September 12, 2023
Organizer: Content Enablers
Location: Webcast
Add Favorite
Tackling the Necessity of Converged IT/...
Federal agencies take seriously the cybersecurity of their IT systems. They must observe numerous federal policies and programs, from Executive Order 14028 on down. Many agencies are far less aware of the need to strengthen the security of their operations technology (OT), the equipment that runs many kinds of systems, including healthcare. Historically, that was less of an issue since most OT systems were closed and standalone. But the intern...
August 29, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity - One Critical Element of CISA...
When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as “an attribute or set of attributes that uniquely describes an agency user or entity,...
August 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search