Back to Search Begin New Search Save Search Auto-Notify
How to Defend Your Expanding Attack Surface
There are plenty of benefits to innovative new technologies, from greater efficiency to cost savings to customer satisfaction. It is rare, however, for a new technology to truly replace existing IT – rather, it gets incorporated into or bolted onto current systems. This approach, along with the explosion of mobile devices and proliferation of software and SaaS applications, dramatically increases and clouds an Agency’s cyber footpr...
June 18, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Decoding Digitalization Defense: Friend...
The adoption and implementation of digitalisation is well underway in most of society, with defence organisations at various stages of the transition. However, are any of them losing out due to the speed of adoption? Given the “new normal” in warfare we are witnessing in Ukraine, what is their plan to create and maintain information superiority without digitalisation? Defence agencies’ traditional working practices are battle...
June 18, 2024
Organizer: AFCEA Pocono | AFCEA Europe
Location: Webcast
Add Favorite
AI and State-Sponsored Espionage - A We...
Join Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats. AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern. Recent trends indicate that cyber espionage is on the rise, and the employment of AI by th...
June 20, 2024
Organizer: Google Cloud Government Team at Carahsoft
Location: Webcast
Add Favorite
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Facilitating Low-Head Dam Removals and...
Join us on July 9, from 12:00 PM - 2:00 PM Eastern for Facilitating Low-Head Dam Removals and Improving Aquatic Resource Restoration Outcomes. Many low-head dams no longer serve their original purpose and their existence often poses a public safety risk and continues to have negative impacts on aquatic resources. This webinar will focus on effective strategies for low head dam removal and aquatic resource restoration in Pennsylvania over the l...
July 9, 2024
Organizer: Association of State Dam Safety Officials
Location: Webcast
Add Favorite
Boosting Data Security & Cyber Resilien...
All the elements of the U.S. healthcare system are under siege by hackers. A recent article in Modern Healthcare reported that “[o]ver the past five years, there’s been a 256% increase in large breaches reported to [the U.S. Department of Health and Human Services] involving hacking and a 264% increase in ransomware.” Federal health agencies face the same risks – and private-sector attacks ripple through the agencies, a...
July 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Revolutionizing Supply Chain Management...
Sayari Global Head of Analytical Solutions David Lynch demonstrates the utility of unified public, commercial and corporate data in illuminating hidden supply chain risk including connections to military end users, state owned enterprises and sanctioned networks. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense industrial base suppliers, identify transship...
July 10, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Back to Search Begin New Search