Back to Search Begin New Search Save Search Auto-Notify
Letting the Good Ones In, Keeping the B...
The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. This makes defining identity crucial – not just for people, but for every device of any kind that tries to access an agency system. The strongest form of identity management is attribute-ba...
October 19, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
5G: The Transformation of Defense Networks
In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD...
October 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Critical Infrastructure Protection ...
Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Europe. The conference will look at developing on the theme of previous events in helping to create better understanding of the issues and the threats, to help facilitate the work to develop frameworks, good risk management, strategic planning and implementation
October 3-5, 2023
Organizer: Torch Marketing Co Ltd
Location: Prague, CZ
Add Favorite
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Data & Analytics Summit
Government entities hold massive amounts of data within their cyber walls. Utilizing and protecting this data is a top priority for leaders across government. As agencies strive to reach new heights in efficiency and effectiveness, new techniques for managing and accessing this very data are coming to the forefront. Most notably, how can leaders translate the data from collection and storage to decision making and action? How are leaders lever...
August 31, 2023
Organizer: GovExec 360
Location: Washington, DC
Add Favorite
Zero Trust: Driving Transformation and...
Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize th...
August 10, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
ICIT Virtual Briefing | OT Risk Alert:...
OT security is finally getting its due attention and priority. As asset owners and OT security architects face growing risks and pressure to connect and converge their networks with those of IT, they need support from their leadership more than ever. Join Claroty and ICIT for a discussion of how CISOs can support these crucial teams to effectively secure these critical networks. Filtering out the noise of doomsday predictions, we offer CISOs p...
July 25, 2023
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
Future-Proof Data Management Through Lo...
Data fabric and data mesh are two concepts frequently mentioned in conversations surrounding enterprise data management. Over the past two decades, enterprise public and private sector organizations have managed data by oscillating through cycles of centralization and decentralization. Despite the abundance of options, the conundrum remains — data consumers want data to be in one place, and easy to find. Collecting all the data into a si...
May 11, 2023
Organizer: Denodo Government Team at Carahsoft
Location: Tampa, FL
Add Favorite
Back to Search Begin New Search