Back to Search Begin New Search Save Search Auto-Notify
ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
April 25-27, 2022
Organizer: Corporate Compliance Seminars
Location: Dulles, VA
Add Favorite
2022 Emerging Technology Virtual Summit
Emerging Technologies are evolving at a faster pace than ever before, especially as the workforce pivots to a telework environment. Throughout this event, we will discuss several new and evolving technologies that are driving real change and innovation throughout the Federal Government: Drones, IOT, and VR.
April 26, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Cyber Vision for 2022: Defending Assets...
Warnings from the White House about potential cyber attacks by a hostile nation-state. Security risks in third-party software code. Ransomware paralyzing schools and hospitals. Phishing schemes targeting employees. Talk of cyberwar. It is a very tough time to be a cybersecurity professional. Success in this ecosystem depends on more than technical expertise and knowledge of specific attack countermeasures. Security and IT leaders need a clear...
April 26, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Federal Mobility Group And ATARC 5G Gov...
The Federal Mobility Group (FMG), in partnership with ATARC, is holding the fourth annual 5G Government Symposium to drive greater awareness of fifth generation (5G) technologies, highlight innovative use cases and showcase current deployments. This event will demonstrate the dynamic opportunities surrounding 5G and the challenges in realizing them. Attendees will learn more about 5G-related applications helping government and industry meet th...
April 19, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
What is the Tactical Edge - and Other U...
Everyone has seen media reports that Russian soldiers are using personal cellphones, rather than encrypted communications, because they made the mistake of destroying 4G and 5G towers. In military terms, they find themselves operating in a “denied environment,” because they accidentally rendered their comms network inoperable.All soldiers in a combat situation are operating at the “tactical edge,” where things like limi...
April 18, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
2022 ATARC Federal Security Breakfast Summit
As agencies look to replace legacy systems with the cloud, Zero Trust has risen as a best cybersecurity practice. Listen in as topic experts discuss the shift to a teleworking workforce and the importance behind Zero Trust security. This shift has triggered new cybersecurity strategies within the Federal Government, especially as Government agencies make the migration to the cloud. Hear from topic experts as they dive into the best practices f...
April 14, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
Powering and Securing Federal Agencies Online
Safeguarding customer access yields better service Federal agencies have faced unprecedented demands over the past few years, as the pandemic shut down physical offices, forcing employees to work from home and requiring agencies to completely rethink how to provide services. Data breaches and accelerating ransomware attacks have harmed agencies’ operations just as they became dependent on online delivery of services. Now agencies are bei...
April 13, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Access Management and DevOps: How to Ca...
Some of the most devastating cyber breaches are originating from the DevOps space. Privileged Access Management (PAM) is a critical area of access risk management and identity security at any agency. Privileged accounts have traditionally been given to administrators to access data and applications but with the shifts towards remote work and users, access management needed to adapt. Changing business practices, hybrid IT, cloud, and other form...
April 7, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Zero Trust Summit 2022
As the nation faces more persistent and sophisticated cyber threats than ever before, federal agencies can no longer take for granted that their systems and applications are secure. With that in mind, the federal government is taking unprecedented measures to protect the highly sensitive information of Americans. Central to the government’s efforts to deter, protect against, detect, and respond to a constant barrage of attacks, the Biden...
April 6, 2022
Organizer: CyberScoop
Location: Washington, DC
Add Favorite
ATARC Law Enforcement Summit: Securing...
Federal agencies have been mandated to adopt a zero-trust architecture, Federal leaders must develop a plan to implement a zero-trust architecture, incorporating as appropriate the migration steps that the National Institute of Standards and Technology has laid out. Agency heads need to describe the steps already completed to move to zero trust, identify activities that will have the most immediate security impact and include a schedule to imp...
April 5, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search