Back to Search Begin New Search Save Search Auto-Notify
How to Improve Federal Mobile Security...
The Federal Mobility Group (FMG), established by the Federal CIO Council, was tasked with improving cybersecurity, governance, and accountability for federal mobile device usage and programs. Co-chaired by mobile leaders from DHS, GSA, and NIST, the FMG sponsors a Federal Information Security Modernization Act (FISMA) Mobility Metrics Working Group (FMMWG) that is focused on updating the FISMA mobility metrics for fiscal year 2022 and beyond....
October 21, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
The Journey to Zero Trust: Start with P...
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best pra...
June 24, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting Bring Your Own (BYO) Mobile...
The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) released a practice guide titled Mobile Device Security: Bring Your Own Device. This NIST gui...
June 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting BYO Mobile Devices within Ze...
ATARC Presents in Partnership with Zimperium An open discussion with experts from the National Institute of Standards and Technology (NIST), the MITRE Corporation, and U.S. Department of Defense. The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National...
June 9, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Edge Computing – A Must for 5G and IOT...
As the federal government evolves into the “new normal” as a result of COVID-19, Federal data architectures have changed to adapt. Edge computing, alongside 5G and IOT, has created the opportunity for more efficient decisioning at the point of events. Data can be analyzed at near real-time speeds, accelerating decisions that impact critical missions and improve government operations. By collecting and processing data closer to the...
May 20, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Planning for 5G Security
The federal government is a 5G pioneer. Agencies and the military are finding ways to leverage the wireless technology for a widening array of data-heavy applications. The U.S. military, in particular, is on 5G's cutting edge, leveraging the next-generation wireless technology for practical and innovative functions that could also be used in civilian applications.The DOD's $1.5B 5G experimentation and testing program at 12 U.S. military test s...
April 22, 2021
Organizer: Public Sector 360
Location: Webcast
Add Favorite
FMG & ATARC 5G Government Symposium
An event on the Federal Mobility Group and Its Role in the Government.
April 20, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Securing the Remote Workforce – A Movin...
When the first lockdown orders in response to the COVID-19 pandemic were issued in March 2020, many agencies at all levels of government had to scramble to accommodate large numbers of their workers suddenly teleworking. The importance of implementing securing zero-trust security methodology (or architecture)– maintaining strict access controls and not trusting any user automatically, whether inside or outside the network perimeter ...
April 1, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Government’s Strategic Roadmap to Edge...
IDC defines edge computing as processing that is done at or near the source of government data, which secures and reduces data transport time as well as network traffic. Growing adoption of Internet of Things (IoT) tools such as traffic sensors, security cameras, and building security devices is creating 95% of the growth in network traffic. The value of edge computing spans an ever-widening number of missions. For example, adding data analyti...
March 18, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity: The Foundation of Mobile Security
Digital transformation of government agencies across the board has resulting in an explosion of digital services, and the recent move to telework with widespread delivery of citizen services online has only further increased the impact. National Institute of Standards and Technology, has established digital identity guidelines that lower the risk and assure the appropriate level of confidence to prevent impersonation and other attacks. As tech...
March 4, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search