Back to Search Begin New Search Save Search Auto-Notify
DoD: Embracing Continuous Monitoring
Federal cyber leaders are tasked with the challenge of balancing active defense efforts, particularly when the U.S. is involved in international conflict, with building an infrastructure secure from the individual device all the way to enterprise environment. To do all of that, defending their networks and building for the future, DoD leaders must prioritize continuous monitoring of their cyber systems to address hidden vulnerabilities to addr...
May 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberArk IMPACT World Tour - DC
CyberArk is taking the Identity Security conversation to the Washington, DC area during IMPACT World Tour. Join us and your Public Sector and industry peers in Tyson's Corner on April 3rd, to discuss the ever-expanding attack surface, the latest techniques in identity-based cyberattacks, and innovations in Identity Security technology. You'll walk away informed and inspired to take your Identity Security program to the next level. Who should a...
April 3, 2024
Organizer: Merlin Cyber
Location: McLean, VA
Add Favorite
DevOps Hurdles in 2023 and How to Overc...
DevOps plays a crucial role in an organization’s IT landscape. Even though it’s 2023, there are still hurdles that agencies need to overcome in order to implement the best practices for their DevOps environments. One challenge could be the initial cost of a platform, especially in comparison to legacy platforms that have already been deployed. Another issue is the turnover rates for DevOps professionals. Some candidates are more li...
March 2, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
ATARC Federal Devops Breakfast Summit
With many older systems in place, the government is one sector that could use DevOps the most. However, like many industries, there are often challenges adopting new ways of doing things. That being said, this panel will focus on roadblocks towards DevOp adoption and addressing how to overcome them. What are the challenges to Devops adoption? What are steps that help make DevOps a reality? Join us for this discussion as topic experts will disc...
November 30, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
How to Accelerate DevOps and Cloud with...
Cloud computing has introduced new complexities to the public sector, with teams now being responsible for maintaining scalable infrastructure and applications in increasingly complex and distributed environments. The demand for automation has produced a new role, which has arguably become one of the most critical functions in a cloud-first business: the site reliability engineer. DevOps has pushed a shared responsibility for the reliability a...
August 11, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Best Practices for DevSecOps and Author...
Shifting left and building software with security and compliance integrated from the start is critical to increasing trust in our digital infrastructure. As we have seen through recent executive orders and Department of Defense (DoD) memos, creating a foundation that enables a continuous ability to quickly certify and deliver software is critical to federal organizations being responsive enough to meet their missions. Enabling the Assessor to...
June 30, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Reducing the Attack Surface in Governme...
The increasing pressure by hostile nation-states and other bad actors who are relentlessly probing the networks of federal, state and local governments underlines the importance of effective attack surface management. Government and military networks need to have comprehensive end-to-end discovery and management capabilities. This includes both their on-premises and cloud attack surfaces. Detecting unknown assets, unsanctioned connections, mis...
April 28, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Access Management and DevOps: How to Ca...
Some of the most devastating cyber breaches are originating from the DevOps space. Privileged Access Management (PAM) is a critical area of access risk management and identity security at any agency. Privileged accounts have traditionally been given to administrators to access data and applications but with the shifts towards remote work and users, access management needed to adapt. Changing business practices, hybrid IT, cloud, and other form...
April 7, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Compliant Data is the Universal Fuel fo...
Government agencies everywhere generate massive amounts of data. For many agencies, it is the core of their operations, whether processing benefits applications, screening financial transactions for illegal activities, measuring the impact of weather events, or myriad other uses. Data is critical to making DevOps (DevSecOps, too) work. It is the reason migrating to the cloud opens up such possibilities for new services. It is why setting up a...
March 24, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search