Back to Search Begin New Search Save Search Auto-Notify
5G: The Transformation of Defense Networks
In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD...
October 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Data & Analytics Summit
Government entities hold massive amounts of data within their cyber walls. Utilizing and protecting this data is a top priority for leaders across government. As agencies strive to reach new heights in efficiency and effectiveness, new techniques for managing and accessing this very data are coming to the forefront. Most notably, how can leaders translate the data from collection and storage to decision making and action? How are leaders lever...
August 31, 2023
Organizer: GovExec 360
Location: Washington, DC
Add Favorite
Zero Trust: Driving Transformation and...
Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize th...
August 10, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
ICIT Virtual Briefing | OT Risk Alert:...
OT security is finally getting its due attention and priority. As asset owners and OT security architects face growing risks and pressure to connect and converge their networks with those of IT, they need support from their leadership more than ever. Join Claroty and ICIT for a discussion of how CISOs can support these crucial teams to effectively secure these critical networks. Filtering out the noise of doomsday predictions, we offer CISOs p...
July 25, 2023
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
FCW Summit: CDM
As the Continuous Diagnostic and Mitigation (CDM) program matures, it continues to evolve its capabilities to help federal agencies improve their security posture. From access to critical executive dashboards and shared services to guidance on secure acquisition strategy, CDM offerings provide a dynamic approach to fortifying the cybersecurity of government networks and systems. The increased focus on cybersecurity following President Biden...
November 2, 2022
Organizer: GovExec 360
Location: Virtual
Add Favorite
CyberWeek 2022
CYBERSCOOP PRESENTS CYBERWEEK Join over 10,000 influential leaders from the cybersecurity community at CyberWeek, the nation’s largest week-long cybersecurity festival focused on digital threats, best practices and the U.S. government’s work on improving cyberspace. CyberWeek is an annual movement bringing together top C-Suite leaders from major technology companies, state and federal government agencies, and other influential deci...
October 17-21, 2022
Organizer: CyberScoop
Location: Virtual
Add Favorite
ICIT Virtual Briefing: Software Supply...
ICIT Virtual Briefing: Software Supply Chain Security – Balancing Internal Orchestration with Attack Vectors Along with security controls and AppSec policies, the way you and your teams treat the software you build over time impacts the speed at which you can react to a threat. The truth is that open source software (OSS) is often treated as if it isn’t a security problem—until it is. The log4j vulnerability and the subsequen...
October 12, 2022
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search