HEC-RAS 2D
This is an interactive seminar focused on the application and benefit of two-dimensional flow capabilities of HEC-RAS, specific to the dam safety industry. The course will maintain a balance between lecture-style presentations on model theory and hands-on workshop sessions for examples of model applications. Topics will include applications and benefits of HEC-RAS 2D modeling; RAS Mapper and terrain preparation; running 2D models including dam...
Focus on Cyber Resiliency in a Hostile World
The internet is an increasingly dangerous place. The FBI warns of Chinese threats to U.S. critical infrastructure, while the National Security Agency releases guidance for strengthening AI system security. Meanwhile, agencies still wrestle with phishing, ransomware and myriad other threats that occur every day. At the same time, government organizations are expected to implement zero trust architectures, improve identity and access management,...
May 15, 2024
Organizer:
FedInsider Location:
Webcast
Election Security: Protecting the Found...
Administering elections falls on the shoulders of state and territorial governments. It is not surprising, then, that there are so many different approaches, technologies, and processes in place to handle election infrastructure. The problems that befall election infrastructure are many, varied, and often well publicized. In Maricopa County, Ariz., ballots were too lightly printed to be read by scanners during the 2022 midterms. Multnomah Coun...
May 9, 2024
Organizer:
FedInsider Location:
Webcast
AI for Government Summit: Taking the Le...
No matter how quickly technology has changed over the past few decades, nothing matches the speed with which AI has begun to transform how agencies operate. In response to the changing landscape, in October 2023, the Biden administration released two frameworks, the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence and the Office of Science and Technology Policy’s Blueprint for an AI Bill...
May 2, 2024
Organizer:
FedInsider Location:
Reston, VA
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer:
ATARC Location:
Webcast
Metrics that Matter for Critical Infras...
Critical infrastructure services in North America face accelerating threats from both nation-states and other sophisticated threat actors. Governments globally are grappling with how to best balance incentives, support, and direct oversight. Meanwhile, critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience. For instance, the healthcare industry...
April 23, 2024
Organizer:
FedInsider Location:
Webcast
Cloud Architecture Matters: Improve Clo...
As agencies increasingly migrate their workloads to the cloud, it is crucial to understand the implications and benefits of writing natively to the cloud, which enables organizations to optimize their data protection strategies, streamline operations, and enhance overall security. “Writing natively” is about building, deploying and managing software apps in the cloud computing environment. Taking this approach makes it possible to...
March 26, 2024
Organizer:
FedInsider Location:
Webcast
Overcoming Legacy Infrastructure Throug...
Educational institutions and state and local agencies historically have been challenged to keep up with technological advancements – their budgets are tight, their users are increasingly distributed post-pandemic, and they face significant operating expenses from maintaining legacy architectures and equipment. Digital transformation is appealing, but for many organizations the challenge is where to start. As the generation of data has ex...
March 7, 2024
Organizer:
FedInsider Location:
Webcast
EmpowerGov: Future-Proofing Public Service
As custodians of critical information and public trust, government employees confront intricate security challenges in a landscape filled with multifaceted threats. They require a sophisticated approach to the technology that underpins their operations. IT leaders are strategically incorporating specialized frameworks into their tech stacks, thereby gaining comprehensive control over mobile operations. This encompasses overseeing identities, m...
February 22, 2024
Organizer:
GovExec 360 Location:
Washington, DC
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.