Back to Search Begin New Search Save Search Auto-Notify
DoD Investing in the Future of 5G
Communications security is one of the foremost priorities in any battlespace. This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly. Its ability to handle massive amounts of data makes it a crucial component in real-time data collection from all sources,...
October 20, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Letting the Good Ones In, Keeping the B...
The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. This makes defining identity crucial – not just for people, but for every device of any kind that tries to access an agency system. The strongest form of identity management is attribute-ba...
October 19, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
ATARC'S Strategic Resilience: Advancing...
Join us for insightful panel discussions where topic experts will demonstrate a broad range of complementary capabilities for creating mission-ready edge solutions. Additionally, experts delve into the multifaceted realm of security within the DoD. Experts and thought leaders will share their insights on the strategies employed to secure military operations, safeguard classified data, and ensure the uninterrupted functionality of communication...
October 19, 2023
Organizer: ATARC
Location: Arlington, VA
Add Favorite
5G: The Transformation of Defense Networks
In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD...
October 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Critical Infrastructure Protection ...
Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Europe. The conference will look at developing on the theme of previous events in helping to create better understanding of the issues and the threats, to help facilitate the work to develop frameworks, good risk management, strategic planning and implementation
October 3-5, 2023
Organizer: Torch Marketing Co Ltd
Location: Prague, CZ
Add Favorite
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
How to Fight Threats to the Software Su...
After several high-profile cyber incidents resulting from exploited vulnerabilities, the Office of Management and Budget released a memorandum (M-22-09) in 2022 that requires agencies to adopt a Federal Zero-Trust architecture. This new architecture includes a key element: requiring agencies to meet specific cyber standards, including application security testing, by the end of 2024. Two elements of modern software are growing in importance fo...
September 14, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Revolutionizing Endpoint Security ...
As a trusted partner and valued federal customer, your security requirements have always been at the forefront of our innovations. We are excited to showcase how BigFix 11 can empower your agency to proactively safeguard critical assets and infrastructure against the ever-evolving threat landscape. During this session, HCLSoftware will unveil the latest security enhancements of our endpoint management platform and demonstrate how BigFix can em...
September 7, 2023
Organizer: HCLSoftware & Four Inc.
Location: Webcast
Add Favorite
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search