Back to Search Begin New Search Save Search Auto-Notify
From Chaos to Clarity: Using Cloud to S...
There are few things worse for agency efficiency – or IT employee morale – than having fragmented service requests, overwhelming workflows, and siloed knowledge. It is not that IT employees aren’t working hard to solve problems, it’s that the tools they have been using cannot scale up as fast as user needs accumulate. This is a process ripe for streamlining – implementing structured intake, routing, and self-servi...
June 25, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Talking Tech: Simplifying STIG Complian...
The U.S. Department of Defense uses security standards that are set forth in its Security Technical Implementation Guide (STIG) to help protect its systems and networks. By implementing unified automation, which integrates automated tools with the STIG standards, DoD can improve system-level control compliance throughout the software lifecycle. From reduced timelines and improved reliability to sustainable ATO processes, unified STIG automatio...
June 26, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
One Screen, All Networks: A Simpler App...
From the warfighter on the edge to the policymaker in Washington, having clear, complete and timely information is imperative. Yet, today’s secure operations are often hindered by complexity, multiple workstations, siloed systems and outdated cross-domain workflows that drain resources, slow decisions and inflate costs. This webinar explores how government agencies can modernize their approach to classified and unclassified data access,...
June 26, 2025
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Mobile Security: The Human Factor
Phishing today isn’t just email; it attacks through SMS, Signal, LinkedIn, you name it. Mobile-specific attacks (called “mishing”) and attacks through QR codes (called “quishing”) target the owners of the devices, counting on human vulnerability to such attacks. Protecting users from falling for such schemes is difficult. Researchers have seen malicious mishing campaigns downloading malware able to hijack verifica...
June 27, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Mobile Security: The Human Layer is the...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Mission-Centered Design for Real World...
Join us for a dynamic FedInsider discussion on how mission-centered system design can transform public sector services into improved, outcomes-driven models. As expectations around cost reduction and efficiencies continue to drive change, government and industry leaders must go beyond incremental improvements to reshape how citizen experiences are designed and in fact delivered. This webinar will explore how focusing on mission outcomes can pr...
July 8, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
How to Get Your Security Aligned with t...
Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet. Among the best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines t...
July 9, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
The Modern Endpoint - It's Personal
Today’s workforce isn’t tethered to laptops – it’s powered by mobile. It’s often a primary way many employees connect to email and other mission-critical resources but not treated that way from a security standpoint. Traditional Mobile Device Management (MDM) solutions weren’t built to detect advanced threats or align with Zero Trust principles. They offer basic control, but not the telemetry, risk context,...
July 10, 2025
Organizer: Fedinsider
Location: Webcast
Add Favorite
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
July 14-16, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
July 14-18, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Back to Search Begin New Search