Back to Search Begin New Search Save Search Auto-Notify
Best Practices for a Zero Trust Approac...
Old-school perimeter-based security relies on separating the "bad guys" from the "good guys." Zero Trust assumes that the bad guys are already in your network and have access to your applications and systems. Zero Trust works on the principle "never trust, always verify.” Join us to learn best practices on how organizations will continue implementing Zero Trust architectures. While Zero Trust is a strong approach to addressing modern cyb...
September 22, 2021
Organizer: AFCEA International | Signal Webinar Series
Location: Webcast
Add Favorite
Forrester Total Economic Impact: Forcep...
Forcepoint’s Raise the Bar-compliant Cross Domain suite is in operational use in some of the most stringent environments in the world, securing global missions efficiently and effectively while providing a high degree of usability, without compromising security. Forrester Consulting presents key challenges a Department of Defense intelligence agency encounters and how the implementation of a Forcepoint cross domain solution can provide c...
September 22, 2021
Organizer: Forcepoint
Location: Webcast
Add Favorite
FCW Workshop: Electronic Records Management
Federal agencies must shift fully to electronic records management by December 2022, when the National Archives and Records Administration will stop accepting new paper records. Successfully making that transition entails far more than simply digitizing existing documents. Meeting the goals set by M-19-21 demands changes to current business processes, dramatically different approaches to content classification, new systems that are digital thr...
September 21, 2021
Organizer: Public Sector 360
Location: Virtual
Add Favorite
Innovations in Scale-Out File Storage
Customers are struggling to handle the volume, variety, and velocity of unstructured data as it continues to grow inside and outside their enterprise – often said to be 80% of a company’s data footprint. In this webinar, you can participate in an engaging conversation between a leading IDC analyst, the CTO of University of Texas, and a Dell Technologies data storage expert about the unstructured data market, best practices for mana...
September 15, 2021
Organizer: Dell Technologies
Location: Webcast
Add Favorite
Intelligence Sensor Data Analytics at t...
To maintain warfighting overmatch, coordinate deployed forces, and enable new warfighting capabilities, the DoD is actively looking to new programs such as the Joint All-Domain Command and Control (JADC2) strategy to ensure warfighters have maximum situational awareness. This drives the development of networks linking the cloud, command posts, combat platforms, and dismounted warfighter — including the addition of vast numbers of sensors...
September 15, 2021
Organizer: AFCEA International | Signal Webinar Series
Location: Webcast
Add Favorite
FCW Workshop: Emerging Tech
Emerging technologies have always offered the promise of better, faster, cheaper processing and problem solving, but they also bring a host of challenges with them, from security and operational issues to privacy concerns. The past year has also shown that necessity remains the mother of invention, as agencies moved to adapt technology to remote workplace models, as well as roll out new services and capabilities demanded by the pandemic. Where...
September 14, 2021
Organizer: Public Sector 360
Location: Virtual
Add Favorite
Scaling Innovation
The Department of Defense innovation ecosystem serves as an incubator for new technology and processes. Discover how these agencies are modeling new best practices that scale robust collaboration within the services and across the defense industrial base. Understand what capabilities are needed to secure and drive mission success today. How can organizations harness true collaboration via Bluescape’s secure digital whiteboard (IL4 ATO/DI...
September 2, 2021
Organizer: AFCEA International | Signal Webinar Series
Location: Webcast
Add Favorite
Government Cybersecurity: An Ounce of P...
The White House Executive Order on cybersecurity, issued in May following high-profile ransomware attacks on enterprises as varied as oil pipelines and healthcare, directs the federal government to “improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors.” In response, the National Institute of Standards and Technology has already released guidance outlining security measures for cri...
August 31, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Advancing DevSecOps Throughout the U.S....
When you hear the word DevSecOps, what does it mean to you? What is the most authentic meaning of the term? DevSecOps gives people, those with the most context, the responsibility for security decisions without sacrificing required safety. DevSecOps is less of a technology problem and more of an organizational and people issue. Tune in as topic experts dive into what it means to adopt DevSecOps from a people-change perspective. How should the...
August 31, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search