5G as a Digital Transformation Accelerant
The United States leads the world in adopting 5G technology for communications and wireless internet access, thanks to its high speed, low latency, and increased bandwidth access. This has provided a huge boost to digital transformation in both the public and private sectors. For instance, the rapid adoption of edge computing can be attributed to 5G’s superior qualities. The spread of 5G was accelerated by the pandemic, as agencies and b...
October 7, 2024
Organizer:
FedInsider Location:
Webcast
CyberSmart 2024: Cybersecurity Excellen...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
October 3, 2024
Organizer:
FedInsider Location:
Austin, TX
AI Promises to Unlock Research Potentia...
The federal government is doing everything it can to encourage agencies to adopt artificial intelligence tools to improve all aspects of their performance, while simultaneously paying close attention to potential risks of this exciting new technology. Currently, few agencies have adequate access to supercomputers and the deep expertise needed to operate the technology and test potential applications on secure infrastructure. This is beginning...
October 2, 2024
Organizer:
FedInsider Location:
Webcast
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mit...
Transforming Public Sector Leadership w...
In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. For instance, using data gathered on water quality can be used for planning and designing environmental interventions to keep pollutants out of groundwater. Many agencies may implement data-driven decisions to improve citizen services, cutting down on response times and improving the quality of those servic...
September 30, 2024
Organizer:
FedInsider Location:
Webcast
The Future of 5G Technology in Government
The advent of 5G technology opened a new world of possibilities, enabling applications such as autonomous vehicles, the Internet of Things IoT), and smart cities. The next-generation communications standard already in development – 6G – is a revolutionary technology that will provide unprecedented speeds and low latency, making it perfect for innovative use cases such as smart homes, autonomous transportation systems, healthcare, a...
September 27, 2024
Organizer:
FedInsider Location:
Webcast
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Election Security: Security is Top-of-M...
The 2020 election and its aftermath provided a vivid demonstration of many of the risks faced by election officials across the country – and new dangers have emerged in 2024. Physical threats to poll workers have proliferated, AI-generated disinformation showed up in one state’s primary contest, and other AI threats, whether from partisan interests, corporate disinterest or hostile nation-states, loom large. The landscape is so dan...
September 26, 2024
Organizer:
FedInsider Location:
Webcast
Bringing Automation to Cloud Risk Management
The federal government invests a lot of time, money and manpower into cybersecurity to protect its IT systems and, by extension, the national interest, from criminals and hostile nation-states. Cybersecurity is such a priority that even the National Security Agency, normally one of the government’s most secretive organizations, released guidance for both public and private sector organizations looking to strengthen their cloud security....
September 25, 2024
Organizer:
Fedinsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.