Metrics that Matter for Critical Infras...
Critical infrastructure services in North America face accelerating threats from both nation-states and other sophisticated threat actors. Governments globally are grappling with how to best balance incentives, support, and direct oversight. Meanwhile, critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience. For instance, the healthcare industry...
April 23, 2024
Organizer:
FedInsider Location:
Webcast
Customs Cargo Compliance: Everything Yo...
When it comes to import customs and regulatory agency compliance, there are many variables to consider. If you expect to get your cargo into the country in a timely and efficient manner, it is important to get it right the first time. The risks are too great for noncompliance when considering the potential government penalty actions, increased costs, and loss of reputation. In this webinar, we’ll cover: Elementary compliance – Alwa...
How Digital Playbooks Propel Federal Mo...
Successful federal modernization requires an artful blend of people, process, and technology—with a relentless focus on enabling business transformation. A “digital playbook” can provide a comprehensive guide to the process, describing both overarching strategy and tactical approaches. Using a templatized technology strategy can boost mission outcomes while humanizing data-driven modernization and leveraging artificial intell...
April 25, 2024
Organizer:
FedInsider Location:
Webcast
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer:
FedInsider Location:
Webcast
Automate, Analyze, Act: Streamlining Yo...
Join Elastic and the Arizona Department of Homeland Security (AZDOHS) to learn how their agency is leveraging Elastic to combat evolving threats. Elastic provides a centralized security information and event management (SIEM) platform and log aggregation, offering real-time visibility for improved cybersecurity and threat detection. With Elastic, organizations of all sizes can streamline log analysis, prioritize alerts based on threat relevanc...
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer:
Fedinsider Location:
Webcast
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer:
ATARC Location:
Webcast
Election Security: Protecting the Found...
Administering elections falls on the shoulders of state and territorial governments. It is not surprising, then, that there are so many different approaches, technologies, and processes in place to handle election infrastructure. The problems that befall election infrastructure are many, varied, and often well publicized. In Maricopa County, Ariz., ballots were too lightly printed to be read by scanners during the 2022 midterms. Multnomah Coun...
May 9, 2024
Organizer:
FedInsider Location:
Webcast
Preventing Fatalities in Confined Space...
Join us on May 14, from 12:00 PM - 2:00 PM Eastern for Preventing Fatalities in Confined Spaces at Dams. Most dams have facilities that include permit-required confined spaces. These spaces can include towers, risers, galleries, manholes, vaults, conduits, instrument enclosures, tunnels, adits, drainage systems, etc., that are often unmarked and possess several unique hazards to dam inspectors, operators, and trespassers that are not intuitive...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.