Back to Search Begin New Search Save Search Auto-Notify
A Look at Evolving Insider Risk Programs
Insider Risk Programs have continued to evolve naturally over the past 20 years. They have grown exponentially beyond the traditional lens of trying to identify spies through cyber-focused data exfiltration events. Today, Insider Risk Programs have expanded to include internal HR, legal, and compliance stakeholders within organizations and have expanded security beyond strictly physical and cyber domains to now include analysts, investigators,...
October 24, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
DoD Investing in the Future of 5G
Communications security is one of the foremost priorities in any battlespace. This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly. Its ability to handle massive amounts of data makes it a crucial component in real-time data collection from all sources,...
October 20, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Letting the Good Ones In, Keeping the B...
The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. This makes defining identity crucial – not just for people, but for every device of any kind that tries to access an agency system. The strongest form of identity management is attribute-ba...
October 19, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
ATARC'S Strategic Resilience: Advancing...
Join us for insightful panel discussions where topic experts will demonstrate a broad range of complementary capabilities for creating mission-ready edge solutions. Additionally, experts delve into the multifaceted realm of security within the DoD. Experts and thought leaders will share their insights on the strategies employed to secure military operations, safeguard classified data, and ensure the uninterrupted functionality of communication...
October 19, 2023
Organizer: ATARC
Location: Arlington, VA
Add Favorite
NOAA IT Security & Privacy Conference
A recent World Economic Forum report warned that the three top global risks to society, by likelihood, are: Extreme Weather Events Natural Disasters Cyber Attacks No US cybersecurity division deals with this tricky trifecta daily, except for the exceptional team at NOAA. Covering from sea to space, NOAA provides minute-to-minute data about the conditions of our oceans, our major waterways and our atmosphere. And to do it without any interrupti...
October 18, 2023
Organizer: Federal Business Council (FBC)
Location: Silver Spring, MD
Add Favorite
5G: The Transformation of Defense Networks
In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD...
October 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
ACI's 5th Conference on U.S.-China Trad...
As the only comprehensive, practical event of its kind in the Unites States, ACI is pleased to announce the highly anticipated 5th Annual U.S.-China Trade Controls Conference, scheduled for October 12–13 in Washington, DC. Considering increasing geopolitical risks and intensifying strategic advanced computing competition with China, the U.S. government continues to ramp up enforcement efforts of China export controls and economic sanctio...
October 12-13, 2023
Organizer: American Conference Institute
Location: Washington, DC
Add Favorite
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
How to Fight Threats to the Software Su...
After several high-profile cyber incidents resulting from exploited vulnerabilities, the Office of Management and Budget released a memorandum (M-22-09) in 2022 that requires agencies to adopt a Federal Zero-Trust architecture. This new architecture includes a key element: requiring agencies to meet specific cyber standards, including application security testing, by the end of 2024. Two elements of modern software are growing in importance fo...
September 14, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search