7 past events found
Back to Search Begin New Search Save Search Auto-Notify
Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberThreats 2023: Federal Civilian Age...
The long-term effects of the pandemic continue to push agencies to accelerate IT modernization and move from owning their own on-site data centers to hybrid and multi-cloud architectures. The pandemic spurred greater customer demand for digital services, while employees adapted quickly to working from home. These trends, in turn, heightened the stakes for cybersecurity that protects the endpoints and strengthens data security – part of t...
April 27, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Sharing Responsibility for Protecting t...
Cyberattacks against organizations are now often using what might be considered a “bank shot” – planting malicious code in software components before they are used in products. When coders draw upon software libraries, whether open source or proprietary, to build new applications, they unwittingly include the malware. This is a less conspicuous method that threatens the software supply chain and harms organizations’ wil...
January 11, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Meeting Mandates with Identity-Driven Z...
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a zero trust architecture strategy. The purpose of the mandate is to defend against sophisticated penetrations by adversaries, whether nation-states or criminals, and it emphasized that identity management and access controls are key components. Taken together, identity and access controls mean that privileged access...
September 1, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Risk Management Case Study: The Fire at...
A year ago this April 15th, the world watched in horror as fire raged at Notre Dame Cathedral in Paris. When the soaring spire atop the cathedral tipped and then collapsed into the flames, fears grew at whether Notre Dame could survive. Thankfully, the efforts and strategic thinking of the brave women and men of the Paris fire brigade, which kept the fire from overtaking the church’s two towers, enabled the main structure to be saved, al...
April 15, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Risk-Proofing the Government Supply Chain
The global supply chain provides the opportunity for significant benefits to government, including lower costs, interoperability, rapid innovation, and a variety of product features and options. However, this also enables opportunities for adversaries to affect the management and operations of government agencies, resulting in risks such as counterfeit parts, unauthorized production, tampering, theft, or insertion of malicious software, as wel...
March 15, 2018
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
National Preparedness: Countermeasures...
Our nation’s preparedness against chemical, biological, radiological, nuclear and explosive threats (CBRNE) hinges on improved threat awareness, advanced surveillance and detection, and responsive countermeasures. This video webinar will explore awareness, prevention, preparedness and response to CBRNE and how agencies are working together for the protection of life, health, property and commerce. Learning Objectives Define the strategie...
June 28, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search