Adding System Observability to Monitori...
Government agencies at all levels are under pressure to modernize their IT infrastructure to meet the evolving needs and expectations of their customers, stakeholders, and employees. The ubiquity of smart phones and tailored apps in the broader world have raised user expectations for government systems to work the same way. Modernization certainly presents a host of opportunities to improve agencies’ performance, but it comes with its ow...
October 9, 2024
Organizer:
FedInsider Location:
Webcast
Data Security Workshop
Government entities hold massive amounts of data within their cyber walls, and the utilization and protection of this data is a top priority for leaders across government. With an ever-evolving threat landscape and a workforce that often works outside the office, what do leaders need to do to ensure critical data — and the public’s sensitive data — are secure? What roles do emerging technologies play in the protection of such...
Dedicating Cybersecurity Resources to C...
Power grids, water systems, transportation networks and other vital services are essential to communities but lack substantial cyber defenses. Their vulnerabilities make them tempting targets, whether for nation-states or cybercriminals. For instance, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning earlier this year that a Chinese state-sponsored hacking group already has footholds in multiple networks operated by...
August 21, 2024
Organizer:
FedInsider Location:
Webcast
DoD Cloud Workshop
Digital technologies—particularly cloud innovations—are a top priority for the Pentagon as it looks to the future of warfare. To stay ahead, the DOD has invested significant resources into cloud tech designed to allow data to be shared more efficiently across the service branches. Cloud will change how the Pentagon communicates, stores, and processes data. But the technology is still evolving, and there are many challenges to imple...
August 6, 2024
Organizer:
Defense One Location:
Washington, DC
Election Security: Protecting the Found...
States’ voter registration systems and voter access have undergone a host of changes over the past five years, thanks in large part to the Covid-19 pandemic. Many states expanded vote-by-mail options, stepped up automatic voter registration programs, or both. Cities took action, as well – Los Angeles, for instance, has overhauled its voting system infrastructure, using open source, the cloud, and cybersecurity partnerships to updat...
July 18, 2024
Organizer:
FedInsider Location:
Webcast
CDM Success Stories in an Age of Cyber-...
The cyber-attack surface has exploded to include more than just hardware and on premises devices. This can make implementing CDM and achieving success even more difficult-- one of the most common challenges has always been finding the time and resources to do so. So how are agency cyber leaders keeping up? While the Cybersecurity and Infrastructure Security Agency’s Continuous Diagnostics and Mitigation (CDM) program is now a dozen years...
July 10, 2024
Organizer:
FedInsider Location:
Webcast
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer:
FedInsider Location:
Webcast
Focus on Cyber Resiliency in a Hostile World
The internet is an increasingly dangerous place. The FBI warns of Chinese threats to U.S. critical infrastructure, while the National Security Agency releases guidance for strengthening AI system security. Meanwhile, agencies still wrestle with phishing, ransomware and myriad other threats that occur every day. At the same time, government organizations are expected to implement zero trust architectures, improve identity and access management,...
May 15, 2024
Organizer:
FedInsider Location:
Webcast
Election Security: Protecting the Found...
Administering elections falls on the shoulders of state and territorial governments. It is not surprising, then, that there are so many different approaches, technologies, and processes in place to handle election infrastructure. The problems that befall election infrastructure are many, varied, and often well publicized. In Maricopa County, Ariz., ballots were too lightly printed to be read by scanners during the 2022 midterms. Multnomah Coun...
May 9, 2024
Organizer:
FedInsider Location:
Webcast
AI for Government Summit: Taking the Le...
No matter how quickly technology has changed over the past few decades, nothing matches the speed with which AI has begun to transform how agencies operate. In response to the changing landscape, in October 2023, the Biden administration released two frameworks, the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence and the Office of Science and Technology Policy’s Blueprint for an AI Bill...
May 2, 2024
Organizer:
FedInsider Location:
Reston, VA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.