Back to Search Begin New Search Save Search Auto-Notify
Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Cloud Architecture Matters: Improve Clo...
As agencies increasingly migrate their workloads to the cloud, it is crucial to understand the implications and benefits of writing natively to the cloud, which enables organizations to optimize their data protection strategies, streamline operations, and enhance overall security. “Writing natively” is about building, deploying and managing software apps in the cloud computing environment. Taking this approach makes it possible to...
March 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust: In Depth
Federal departments and agencies are making headway in meeting the requirements of Executive Order 14028, issued in May 2021, to strengthen their cybersecurity by implementing a zero trust architecture. To date, many agencies have made progress in areas like identity management and secure access. But the journey toward achieving a zero trust environment is different for every department. The challenges that civilian agencies must overcome are...
March 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Election Security: Protecting the Found...
It has become clear over the past several years that maintaining U.S. election integrity is not just a single agency’s responsibility. Conducting fair and accurate elections is the responsibility of each state and territory. Meanwhile, nation-states, partisans, and scammers can interfere with voter information, try to cast doubt on election outcomes, and spread disinformation across social media, to name just a few. The Office of the Dir...
March 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
March 19-21, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
AFFIRM GovNet - The Art of the Transiti...
Every four years, the Presidential transition from one administration to another presents the Federal Government with one of its most daunting challenges. The planning for this enormous undertaking starts months before the actual election and swearing-in of the President. Behind the scenes, this change has a profound impact on how the Departments function and how they address immediate needs and plan for the future. It is not just a change in...
March 20, 2024
Organizer: AFFIRM
Location: Webcast
Add Favorite
Unlocking Your Agency's Data Treasure T...
Federal agencies collect vast amounts of data that often goes untapped because unlocking its full value is complex. But as agencies move to comply with the White House Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, harnessing the potential in their own data can help meet the EO’s objectives. Agencies can facilitate the use of AI by using their data to train custom large language model...
March 19, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Modernizing Dam Safety - Digital Innova...
With a growing number of dams approaching their design service life, dam safety engineers are looking for ways to mitigate the risks related to public safety, aging infrastructure and rising maintenance costs. Modernizing dam monitoring and maintenance practices with digital advancements, including the latest automated condition monitoring solutions, drone-captured reality modeling and digital twins, are giving public sector dam operators tool...
March 14, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
March 13, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search