Back to Search Begin New Search Save Search Auto-Notify
Delivering Decision Advantage
Navigating the Landscape of Decision Advantage: Dive into a discussion with experts on how the fusion of Decision Intelligence and Decision Support empowers decision-makers, offering insights into resolving crises and strategically leveraging national power to gain a decision advantage in complex scenarios.
May 23, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Benefits of Designing for Exportability...
Benefits of Designing for Exportability to Maximize Your International Business Join us for an insightful webinar on designing for exportability to master navigating the International Traffic in Arms Regulations (ITAR) and Technology Security and Foreign Disclosure (TSFD) requirements of the Arms Export Control Act (AECA). In this one-hour webinar, we will examine the jurisdiction and classification process, TSFD processes, and best practices...
May 23, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
AI and State-Sponsored Espionage - A We...
Join Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats. AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern. Recent trends indicate that cyber espionage is on the rise, and the employment of AI by th...
May 30, 2024
Organizer: Google Cloud Government Team at Carahsoft
Location: Webcast
Add Favorite
To Succeed with Zero Trust & AI, Look t...
Ever since the issuance of Executive Order 14028, issued in May 2021 to improve cybersecurity across the entire government by implementing a zero trust architecture, federal agencies have been hard at work to meet the requirement. Then, in October 2023 – less than 18 months later – a new executive order, 14110, was released on the “Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence.” These are...
May 31, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Trends in Information Sharing: AI Impac...
Trends in Information Sharing: AI Impacts on Regulatory Compliance and Best Practices The continuing evolution and use of artificial intelligence is reshaping compliance frameworks, necessitating more efficient and secure information sharing practices across industries worldwide. Join us as we explore the transformative effects of AI on the regulatory landscape and best practices concerning the protection and sharing of various types of sensit...
June 4, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
Prioritizing Mission Delivery & Zero Tr...
Agencies increasingly rely on Software-as-a-Service (SaaS) platforms such as Salesforce for mission-critical functions, which offers them numerous benefits including flexibility, reducing upfront IT resource costs and delegating upgrades and patches to the provider. Using Salesforce does not remove the agencies’ responsibility for cybersecurity, however, and SaaS applications face their own risks, including misconfigurations, poor access...
June 5, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Prioritizing Mission Delivery & Zero Tr...
Agencies increasingly rely on Software-as-a-Service (SaaS) platforms such as Salesforce for mission-critical functions, which offers them numerous benefits including flexibility, reducing upfront IT resource costs and delegating upgrades and patches to the provider. Using Salesforce does not remove the agencies’ responsibility for cybersecurity, however, and SaaS applications face their own risks, including misconfigurations, poor access...
June 5, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
June 6, 2024
Organizer: ThreatLocker Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search