Back to Search Begin New Search Save Search Auto-Notify
DoD's Roadmap for Zero Trust Strategy
When the White House issued Executive Order 14028, “Improving the Nation's Cybersecurity” in May 2021, it established the framework for the Office of Management and Budget’s January 2022 memorandum directing all agencies to implement a Federal Zero Trust Strategy. The Department of Defense has now released its own Zero Trust Strategy and Roadmap, which spells out its four high-level, integrated strategic goals in achieving ze...
March 30, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Changing Landscape of Identity Security
Much of cybersecurity is focused on protecting users’ identities and personal information. This approach has numerous benefits, not just for the individual users but for the systems with which they interact – it protects people from malicious activities such as identity theft, while it also cuts down on bad actors stealing credentials to enter IT systems and wreak havoc, from ransomware to data exfiltration. The National Institute...
March 29, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Protecting the Expanding Cyber Attack Surface
One of the major challenges for IT administrators and staff during the recent pandemic was the explosion of the network as working from home became the norm. Agencies that didn’t already have a good handle on the number of devices connected to their networks or how those devices were configured found themselves overwhelmed by the vast expansion of their vulnerable attack surface. Since that time, the attack surface has continued to expan...
March 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Modernizing IT Without Rip-and-Replace
The push for digital modernization by government at all levels has been under way for several years now. State and local governments had to scramble during the pandemic to find ways to support employees working remotely, adding momentum to the modernization push. Despite the need, IT budgets haven’t kept up – from staffing issues to costly legacy infrastructure, state and local agencies are struggling to find ways to maximize the v...
March 21, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Vision 2023: Transforming Florida Throu...
In today’s digital world, IT modernization and cybersecurity are intertwined with delivering a vast range of state services to residents. According to the National Association of State CIOs, these were the top two concerns facing state governments in 2022. They are two reasons why the state of Florida in 2020 created the Florida Digital Service (FDS), to partner with all state agencies to deliver services. In a state that often faces nat...
February 9, 2023
Organizer: FEDINSIDER
Location: Tallahassee, FL
Add Favorite
Cybersecurity Stays Front-of-Mind in 20...
Federal agencies have taken the lead in the public sector’s adoption of cloud computing. It has provided many benefits, including flexibility for applications, cost savings as legacy systems have been phased out, and empowering customers in their interactions with agencies – but it also has opened new methods for cyberattacks, such as corrupting elements of the software supply chain. As a result, data protection is more important t...
January 31, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Stays Front-of-Mind in 20...
The COVID-19 pandemic forced public sector agencies across the country to rely on their IT to deliver services to customers. The “forced evolution” of systems can be seen as a long-term benefit, but it also amplified the vulnerability of communities to potentially serious cyberattacks. For instance, the threat of ransomware continues to grow as cyber criminals target managed service providers, the cloud, and the software supply cha...
January 26, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Securing Your Networks From IPv6 Threats
Securing Your Networks From IPv6 Threats The explosion of Internet-connected devices – from mobile communications to the Internet of Things – demonstrates the need for the quantum increase in available IP addresses created by moving to IPv6. This webinar, the second of four sessions, addresses the unique strengths and security challenges of IPv6. The shift to IPv6 means that end-to-end encryption is built into devices and systems,...
January 25, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Leveraging Derived Credentials to Secur...
Phishing continues to be one of the most common internet crimes today, but the stakes have risen enormously as our society has become online-driven. More than 80% of these attacks involve credential misuse in the network. With increased remote workers, users need a seamless mobile device experience to be able to do their jobs. Derived credentials allow agencies to utilize existing investments, adopt modern protocols, and apply phishing-resista...
January 12, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
States: Make Plans for Federal Cybersec...
As part of the Infrastructure Investment and Jobs Act of 2021, Congress included $1 billion over the next four years for state, local and tribal governments to strengthen their cybersecurity. The Cybersecurity and Infrastructure Security Agency established the State and Local Cybersecurity Grant Program and the Tribal Cybersecurity Grant Program to distribute funds. The Federal Emergency Management Agency is responsible for administration and...
January 10, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search