Back to Search Begin New Search Save Search Auto-Notify
Fraudulent Behavior and How ICAM Can Assist
The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities. With scams, identity theft, and impersonators at an all-time high, the Federal Government has developed policies and training to prevent attacks. As a result, risk management strategies and internal control systems are implemented, monitored, and modified as necessary by management and governing bodies. A successf...
February 23, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Cybersecurity Stays Front-of-Mind in 20...
Federal agencies have taken the lead in the public sector’s adoption of cloud computing. It has provided many benefits, including flexibility for applications, cost savings as legacy systems have been phased out, and empowering customers in their interactions with agencies – but it also has opened new methods for cyberattacks, such as corrupting elements of the software supply chain. As a result, data protection is more important t...
January 31, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Stays Front-of-Mind in 20...
The COVID-19 pandemic forced public sector agencies across the country to rely on their IT to deliver services to customers. The “forced evolution” of systems can be seen as a long-term benefit, but it also amplified the vulnerability of communities to potentially serious cyberattacks. For instance, the threat of ransomware continues to grow as cyber criminals target managed service providers, the cloud, and the software supply cha...
January 26, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Securing Your Networks From IPv6 Threats
Securing Your Networks From IPv6 Threats The explosion of Internet-connected devices – from mobile communications to the Internet of Things – demonstrates the need for the quantum increase in available IP addresses created by moving to IPv6. This webinar, the second of four sessions, addresses the unique strengths and security challenges of IPv6. The shift to IPv6 means that end-to-end encryption is built into devices and systems,...
January 25, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Growing Trends and How to Accelerate Mi...
Government efforts to modernize saw substantial advancements in 2022: An overwhelming 91% of federal IT workers report their agencies have gained ground on digital modernization efforts in the past year, according to a recent survey of federal employees conducted by Wakefield Research on behalf of ICF. But while optimistic, these employees say their work is far from done. Just 30% have achieved continuous improvement in their modernization jou...
January 19, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Leveraging Derived Credentials to Secur...
Phishing continues to be one of the most common internet crimes today, but the stakes have risen enormously as our society has become online-driven. More than 80% of these attacks involve credential misuse in the network. With increased remote workers, users need a seamless mobile device experience to be able to do their jobs. Derived credentials allow agencies to utilize existing investments, adopt modern protocols, and apply phishing-resista...
January 12, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
New Cyber Threats & Recoveries in 2023...
A focus on strengthening our cybersecurity workforce should be at the forefront of every agencies’ 2023 goals. The cyber workforce must evolve to address the challenges posed by our adversaries and meet strategic mission requirements, while also doing an exemplary job at managing data security. This requires agencies to reshape their understanding of what data security entails and how the future of cyber security must include prioritizin...
January 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
States: Make Plans for Federal Cybersec...
As part of the Infrastructure Investment and Jobs Act of 2021, Congress included $1 billion over the next four years for state, local and tribal governments to strengthen their cybersecurity. The Cybersecurity and Infrastructure Security Agency established the State and Local Cybersecurity Grant Program and the Tribal Cybersecurity Grant Program to distribute funds. The Federal Emergency Management Agency is responsible for administration and...
January 10, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
December 12-14, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
November 7-9, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Back to Search Begin New Search