FCW Network Modernization Workshop
As agencies push their modernization and digital transformation efforts forward, they know that the foundation of the work must focus on the network level. Right before the pandemic hit, the CIO Council provided a white paper to help agencies lay out a plan for their next generation networks. It discussed how new and emerging technologies will change networks of the future and predicted increased use of 5G wireless networks and software define...
Protecting BYO Mobile Devices within Ze...
ATARC Presents in Partnership with Zimperium An open discussion with experts from the National Institute of Standards and Technology (NIST), the MITRE Corporation, and U.S. Department of Defense. The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National...
Cloud Summit
It’s been a decade since "Cloud First" was put forth as a formal goal of government. In that time, agencies have moved from wary experimentation to straightforward "lift and shift" efforts to, increasingly, enterprise as-a-service solutions. The question is no longer whether to leverage cloud servicers, but how best to do so. Yet as the easier moves to the cloud have been made, the remaining systems and workloads require decidedly more c...
AI Strategies & Applications Workshop
Two years after the White House issued an executive order creating a national strategy for artificial intelligence, agencies are moving past pilot projects and are looking for the next level of AI in government. Although some of the most visible projects are at NASA, DOD and IRS, many agencies are working on developing AI projects that support services, improve mission effectiveness and decision making and automate repetitive tasks. There is a...
Defense Readiness Workshop
In October of 2020, then-Defense Secretary Esper defined defense readiness as "our military’s ability to answer the nation’s call, and to fight and win, anytime, anywhere. … The question we must answer is this: if called upon to fight tonight, are we ready?" Ensuring that answer is "yes" demands change in every corner of the Department of Defense, and especially in the technology that will power tomorrow's military. Cybersec...
Data, Digital Identity and Privacy: How...
The federal government has been working to update its policies, architectures and frameworks around digital identity for some time. OMB revised its Identity Credential and Access Management guide in May of 2019 and that National Institute for Standards and Technology has been working on an updated version of its guidance on security and privacy controls for information systems. Then, the pandemic hit, and all programs went into overdrive as ag...
FCW Workshop: Pillars of Modernization
IT modernization has been a federal priority for years, but many agencies still struggle to turn that goal into a practical plan of action. Securing multi-year funding is one challenge, but the fundamental obstacle is often the sheer complexity of transforming government-scale systems. Smart, successful modernization demands a holistic approach that addresses several essential pillars: security, network infrastructure, multi-cloud architecture...
Cloud Security & Services: Matching Dat...
Most government agencies have made the journey to cloud since the Cloud First and Cloud Smart strategies came from OMB starting in 2010. Many organizations have more than one cloud. The challenge becomes blending the different types of cloud and service models to provide access to needed data, while at the same time protecting a much enlarged attack surface created by the large number of workers who are accessing the data remotely. If there is...
Implement the New NIST RMF Standards an...
OVERVIEW By the beginning of 2021, NIST will have released the finals of many Risk Management Framework (RMF) standards: SP800-53 Rev 5 – Security Controls SP800-53B – Security Control Baselines, Privacy Framework SP800-160 Vol 2 – Systems Security Engineering SP800-161 Rev 1 – Supply Chain Risk Management SP800-171 Rev 2 – Controlled Unclassified Information (CUI) and High Valued Assets (HVA) Revisions to the NIS...
FCW Workshop: Managing IT Supply Chain...
The global information technology supply chain has been hit with a growing and unprecedented number of attacks as adversaries attempt to compromise systems with various forms of malware in an attempt to steal or compromise or hold for ransom sensitive information. Federal executives realized how complex the question of supply chain security was in 2017 when officials tried to implement the Department of Homeland Security’s order to remov...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.