Back to Search Begin New Search Save Search Auto-Notify
Cyber Attacks are Just as Damaging as N...
It has been almost seven years since the White House issued Presidential Policy Directive 40, setting out the federal continuity policy “to maintain a comprehensive and effective continuity capability through Continuity of Operations (COOP), Continuity of Government (COG), and Enduring Constitutional Government (ECG) programs, ensuring the resilience and preservation of government structure under the United States Constitution and the co...
October 25, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
AI & Government: How Agencies Can Adopt...
AI will revolutionize how the government delivers on its mission. With AI, Government organizations can enhance decision-making, speed up service delivery, and improve operational efficiencies. Notably, proposing AI projects as part of modernizing operations are likely to get favorable consideration from the Technology Modernization Fund, especially those that look to improve the customer experience. Learning Objectives: Understand steps agenc...
October 24, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Meeting the Requirements of a Mixed IT...
Agencies today are faced with the challenge of modernizing legacy IT solutions to streamline workflows and increase the speed and quality of their services. But the push toward standardization must also take into account that people do their best work when they have the best tools. Join thought leaders in government and industry to discuss how Apple devices are changing the IT landscape from one of mandates to one of choice. We’ll explor...
October 18, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
5G: The Transformation of Defense Networks
In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD...
October 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Applying AI to Advance Agency Missions
Artificial intelligence is becoming increasingly useful in applications throughout the federal government. Officials such as Federal CIO Clare Martorana and Deputy Secretary of Defense Kathleen Hicks speak about its significance in improving customer experiences and rapid returns on investment within DoD. Virtually every federal agency is actively engaged in AI projects. For instance, the departments of Justice and State, as well as the Center...
October 11, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
The Hard Truths of Data Security in the...
The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. On top of that, sensitive data – whether personally identifiable information, financial, intellectual property, etc. – can be scattered throughout the data ocean. In 2022, more than 200 government ag...
October 10, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Moving Customers to the Front of the Di...
Digital transformation has been a central premise of government at all levels tackling the job of ending reliance on legacy technology, upgrading systems and expanding services. Until recently, transformation efforts at the federal level focused on “lift-and-shift,” updating their digital systems or processes to make them better or more innovative, but they didn’t have the customer or end user or employee in mind while doing...
October 5, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Breaking the System into Tiny Little Pi...
The cybersecurity slogan for zero trust is a simple one: Never trust, always verify. States, localities, tribes and territories face the same cyber threats as the federal government, and many of their agencies are wrestling through how they can implement zero trust architectures. One of the most important elements in pursuing zero trust is implementing microsegmentation — partitioning a network into small, isolated sections to reduce the...
September 27, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Who Are You - and Can You Prove It? Ide...
One of the foundational tenets of zero trust architecture is Identity – providing credentials for every person and device – in order to manage access to government systems, whether entering from the outside or moving laterally from within. In other words, identity, credential and access management (ICAM) should be addressed as a whole, not as separate point solutions. This applies across all systems, all platforms, and all environm...
September 20, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Trusting Leaders in a Zero Trust Environment
As State and Local agencies pursue their zero trust goals taking into consideration the Executive Order 14028, “Improving the Nation’s Cybersecurity,” it is easy to focus on technology solutions. But that overlooks something fundamental about both the challenge and the purpose of moving to zero trust – the human beings that will use the redesigned systems to better meet their agency’s mission. If a zero-trust impl...
September 19, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search