Back to Search Begin New Search Save Search Auto-Notify
Focus on Cyber Resiliency in a Hostile World
The internet is an increasingly dangerous place. The FBI warns of Chinese threats to U.S. critical infrastructure, while the National Security Agency releases guidance for strengthening AI system security. Meanwhile, agencies still wrestle with phishing, ransomware and myriad other threats that occur every day. At the same time, government organizations are expected to implement zero trust architectures, improve identity and access management,...
May 15, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Facing the Challenges Artificial Intell...
It is hard to think of a technology that has taken over the IT ecosystem faster than artificial intelligence. OpenAI released ChatGPT in November 2022, and yet it already has evolved so much that it bears little resemblance to v .0. The federal government has been moving quickly by its standards to address AI’s challenges and capabilities, including a Blueprint for an AI Bill of Rights, an AI Risk Management Framework from the National I...
March 5, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
How to Apply DEIA to Your Programs, Pol...
Diversity, equity, inclusion and accessibility (DEIA) isn’t a new concept. However, the Biden Administration has made achieving DEIA goals a cornerstone of its agenda. The only problem is that there are numerous mandates, goals and policies all aimed at improving DEIA, which makes wading through the various directives difficult for overburdened agencies. Join us online Wednesday, Feb. 21 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from...
February 21, 2024
Organizer: GovLoop
Location: Webcast
Add Favorite
FedRAMP Rev 5 and Beyond: Your Key to S...
Since its launch in 2011, FedRAMP has become the best practice for selecting, deploying, and managing cloud systems and applications in the U.S. Federal Government. And in January 2023, the FedRAMP Authorization Act made FedRAMP the law of the land! Now, Rev 5 of FedRAMP brings unprecedented levels of automation and continuous monitoring to this industry leading approach enabling faster submissions and authorizations. The key to these new leve...
November 9, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search