Back to Search Begin New Search Save Search Auto-Notify
Identity - One Critical Element of CISA...
When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as “an attribute or set of attributes that uniquely describes an agency user or entity,...
August 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Powering Innovation Through Technology,...
The spread of 5G – fifth-generation mobile communications – across all levels of government is being accelerated by its usefulness in high-speed data transmissions and flexibility in customizing network applications. And the range of applications by government agencies made possible by 5G may only be limited by one’s imagination. Some of the innovations supported by this wireless standard were born out of necessity – at...
August 17, 2023
Organizer: FEDINSIDER
Location: Reston, VA
Add Favorite
The Urgency of API Security
Cybersecurity professionals are well aware that the threat landscape they live in is volatile and poses ever-changing threats to the systems they defend. One kind of risk is exploding – attacks on APIs. APIs are such attractive targets because their purpose is to allow two or more applications to communicate with each other. Infecting an API drastically expands the attack surface, but most enterprises do not have transparency into their...
August 15, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Stays Front-of-Mind in 2023
Federal agencies have taken the lead in the public sector’s adoption of cloud computing. It has provided many benefits, including flexibility for applications, cost savings as legacy systems have been phased out, and empowering customers in their interactions with agencies – but it also has opened new methods for cyberattacks, such as corrupting elements of the software supply chain. As a result, data protection is more important t...
July 31, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Going All Out to Secure Public Data
Government agencies at all levels are doing everything they can to protect their data from the ongoing onslaught of cyberattacks. Whether it’s implementing zero trust architecture to meet the requirements of Executive Order 14028, federal agencies using FedRAMP certified cloud services, any of the dozens of state, local, municipal and educational organizations enrolled in StateRAMP, government as a whole understands the critical importan...
July 27, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How to Increase Government IT Agility
Government IT is faced with constantly evolving mission demands, limited resources, stringent compliance requirements, and always increasing customer expectations. Agencies increasingly recognize the importance of implementing scalable and secure cloud strategies to meet these challenges.Many agencies’ IT departments are learning that when teams are provided access to a configurable, no code/low code application platform, initiatives can...
July 26, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
IPv6 Case Studies & Lessons Learned
Federal agencies have been mandated to migrate to IPv6; the mandate requires at least 20% of IP-enabled assets on agencies’ networks operate in IPv6-only environments by the end of FY 2023. Join us for the last of the quarterly sessions as thought leaders from government and industry share real-world examples and lessons learned in working to meet this mandate over the past year. We’ll Discuss: Review the progress made by agencies...
July 25, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cyber Attacks are Just as Damaging as N...
It has been almost seven years since the White House issued Presidential Policy Directive 40, setting out the federal continuity policy “to maintain a comprehensive and effective continuity capability through Continuity of Operations (COOP), Continuity of Government (COG), and Enduring Constitutional Government (ECG) programs, ensuring the resilience and preservation of government structure under the United States Constitution and the co...
July 20, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Bringing Agility to the Modern Security...
Modern security threats are evolving at a faster pace than security technologies, while well-funded threat actors are investing in tools like machine learning (ML), automation, and artificial intelligence (AI). Legacy security operations centers – SOCs – are not equipped with the tools to respond to this rapidly evolving landscape, even as the volume of traffic and data grow exponentially. These challenges also come as many agencie...
July 19, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The AI Revolution in Government: How It...
As artificial intelligence (AI) applications proliferate across the internet ecosystem, other changes are being triggered, from the commitment to R&D funding to workforce development to new initiatives in higher education. The federal government’s spending on IT R&D and AI in fiscal year 2023 is estimated at $9.6 billion. Meanwhile, the University of Florida, for instance, declares it is “building an AI university,” a...
July 12, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search