1,466 past events found
+ 15 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Optimizing Human Performance in Tech Ev...
In today’s rapidly evolving technological landscape, government agencies face the daunting task of managing advancements in AI, cybersecurity, and more, while ensuring their workforce remains at the peak of performance. In the realm of agency operations, there are a multitude of challenges that arise, with increasing complexity and declining mental well-being among employees standing out as particularly significant risks to mission succe...
May 16, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
AFFIRM Up Lift: Strengthening Cybersecu...
In today's digital age, cybersecurity has become a crucial component of our nation's security. The recent cyberattacks on critical infrastructure, federal agencies, and private sector entities have shown us the severe and far-reaching consequences of cyber vulnerabilities. As a result, the Biden-Harris administration has made strengthening cybersecurity a top priority. On May 12, 2021, the Executive Order on Improving the Nation's Cybersecurit...
May 15, 2024
Organizer: AFFIRM
Location: Webcast
Add Favorite
Focus on Cyber Resiliency in a Hostile World
The internet is an increasingly dangerous place. The FBI warns of Chinese threats to U.S. critical infrastructure, while the National Security Agency releases guidance for strengthening AI system security. Meanwhile, agencies still wrestle with phishing, ransomware and myriad other threats that occur every day. At the same time, government organizations are expected to implement zero trust architectures, improve identity and access management,...
May 15, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Preventing Fatalities in Confined Space...
Join us on May 14, from 12:00 PM - 2:00 PM Eastern for Preventing Fatalities in Confined Spaces at Dams. Most dams have facilities that include permit-required confined spaces. These spaces can include towers, risers, galleries, manholes, vaults, conduits, instrument enclosures, tunnels, adits, drainage systems, etc., that are often unmarked and possess several unique hazards to dam inspectors, operators, and trespassers that are not intuitive...
May 14, 2024
Organizer: Association of State Dam Safety Officials
Location: Webcast
Add Favorite
Unlocking the Power of A.I. in eDiscovery
In an age where information overload is the norm, harnessing Artificial Intelligence technologies can be the game-changer your eDiscovery needs. Join industry eDiscovery industry experts George Socha (Reveal), Rose J. Jones (King & Spalding), and Zviad Guruli (WilmerHale) as they delve into the cutting-edge realm of leveraging A.I. in the legal practice of eDiscovery.
May 14, 2024
Organizer: American Bar Association
Location: Webcast
Add Favorite
Vision 2024: Getting in a New York (IT)...
The state of New York is emphasizing improving its IT resilience. The state’s 2022-23 strategic plan focuses on moving off legacy systems, implementing an enterprise architecture, and improving service delivery to its residents, to name a few. In addition, the state has its first cybersecurity strategy, and created a Joint Security Operations Center. As the largest city in the United States, New York City has its own technology roadmap,...
May 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Election Security: Protecting the Found...
Administering elections falls on the shoulders of state and territorial governments. It is not surprising, then, that there are so many different approaches, technologies, and processes in place to handle election infrastructure. The problems that befall election infrastructure are many, varied, and often well publicized. In Maricopa County, Ariz., ballots were too lightly printed to be read by scanners during the 2022 midterms. Multnomah Coun...
May 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Securing the Identity Fabric in the Age...
In the realm of government cybersecurity, the Zero Trust framework stands as a beacon of defense against evolving threats. Central to its efficacy are the principles of identity and access management, which redefine traditional security paradigms. Zero Trust advocates for perpetual verification of users, devices, and resources, emphasizing a “never trust, always verify” mantra. Identity verification, facilitated by multifactor auth...
May 9, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
April 30 - May 2, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Back to Search Begin New Search