Best Practices for a Zero Trust Approac...
Old-school perimeter-based security relies on separating the "bad guys" from the "good guys." Zero Trust assumes that the bad guys are already in your network and have access to your applications and systems. Zero Trust works on the principle "never trust, always verify.” Join us to learn best practices on how organizations will continue implementing Zero Trust architectures. While Zero Trust is a strong approach to addressing modern cyb...
Forrester Total Economic Impact: Forcep...
Forcepoint’s Raise the Bar-compliant Cross Domain suite is in operational use in some of the most stringent environments in the world, securing global missions efficiently and effectively while providing a high degree of usability, without compromising security. Forrester Consulting presents key challenges a Department of Defense intelligence agency encounters and how the implementation of a Forcepoint cross domain solution can provide c...
September 22, 2021
Organizer:
Forcepoint Location:
Webcast
FCW Workshop: Electronic Records Management
Federal agencies must shift fully to electronic records management by December 2022, when the National Archives and Records Administration will stop accepting new paper records. Successfully making that transition entails far more than simply digitizing existing documents. Meeting the goals set by M-19-21 demands changes to current business processes, dramatically different approaches to content classification, new systems that are digital thr...
Innovations in Scale-Out File Storage
Customers are struggling to handle the volume, variety, and velocity of unstructured data as it continues to grow inside and outside their enterprise – often said to be 80% of a company’s data footprint. In this webinar, you can participate in an engaging conversation between a leading IDC analyst, the CTO of University of Texas, and a Dell Technologies data storage expert about the unstructured data market, best practices for mana...
Intelligence Sensor Data Analytics at t...
To maintain warfighting overmatch, coordinate deployed forces, and enable new warfighting capabilities, the DoD is actively looking to new programs such as the Joint All-Domain Command and Control (JADC2) strategy to ensure warfighters have maximum situational awareness. This drives the development of networks linking the cloud, command posts, combat platforms, and dismounted warfighter — including the addition of vast numbers of sensors...
FCW Workshop: Emerging Tech
Emerging technologies have always offered the promise of better, faster, cheaper processing and problem solving, but they also bring a host of challenges with them, from security and operational issues to privacy concerns. The past year has also shown that necessity remains the mother of invention, as agencies moved to adapt technology to remote workplace models, as well as roll out new services and capabilities demanded by the pandemic. Where...
Scaling Innovation
The Department of Defense innovation ecosystem serves as an incubator for new technology and processes. Discover how these agencies are modeling new best practices that scale robust collaboration within the services and across the defense industrial base. Understand what capabilities are needed to secure and drive mission success today. How can organizations harness true collaboration via Bluescape’s secure digital whiteboard (IL4 ATO/DI...
Government Cybersecurity: An Ounce of P...
The White House Executive Order on cybersecurity, issued in May following high-profile ransomware attacks on enterprises as varied as oil pipelines and healthcare, directs the federal government to “improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors.” In response, the National Institute of Standards and Technology has already released guidance outlining security measures for cri...
August 31, 2021
Organizer:
FEDINSIDER Location:
Webcast
Advancing DevSecOps Throughout the U.S....
When you hear the word DevSecOps, what does it mean to you? What is the most authentic meaning of the term? DevSecOps gives people, those with the most context, the responsibility for security decisions without sacrificing required safety. DevSecOps is less of a technology problem and more of an organizational and people issue. Tune in as topic experts dive into what it means to adopt DevSecOps from a people-change perspective. How should the...
August 31, 2021
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.