Back to Search Begin New Search Save Search Auto-Notify
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Unlocking Your Agency's Data Treasure T...
Federal agencies collect vast amounts of data that often goes untapped because unlocking its full value is complex. But as agencies move to comply with the White House Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, harnessing the potential in their own data can help meet the EO’s objectives. Agencies can facilitate the use of AI by using their data to train custom large language model...
March 19, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
2024 Vision: Elevating Federal Security...
In today’s digital landscape, where cloud applications play a central role in every enterprise and artificial intelligence fuels rapid innovation, the need for a sophisticated cybersecurity strategy is paramount. With cloud applications at the heart of every digital enterprise and AI-led development certain to accelerate innovation, organizations require an intelligent cloud approach to security that’s intuitive for users and highl...
January 25, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Zero Trust is Needed to Win the Cyber War
Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate. It has been almost two years since the Office of Management and Budget issued its federal zero trust architecture strategy, which set out specific goals for agencies to achieve b...
January 23, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Mission Driven Observability: Enhancing...
Federal agencies need more support to implement modern monitoring tools that help improve their threat detection and response. But how can agencies achieve the resilience required for today’s cyber threats? It starts with prioritizing an observability strategy. In this webinar, experts will discuss the importance of an observability strategy to improve SIEM performance and costs, optimize security information and event management, and ho...
January 18, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
O-RAN - the Next Step for 5G
Advances in telecommunications capabilities are a major driver in Department of Defense programs. From creating secure private networks that U.S. military forces and their partners can use in conflicts to integrating 5G capabilities to create “smart” warehouses to significant improvements in supply chain logistics, DoD has been committed to investing in rethinking the meaning and applications of communications. One of the next step...
October 27, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
DoD Investing in the Future of 5G
Communications security is one of the foremost priorities in any battlespace. This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly. Its ability to handle massive amounts of data makes it a crucial component in real-time data collection from all sources,...
October 20, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Letting the Good Ones In, Keeping the B...
The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. This makes defining identity crucial – not just for people, but for every device of any kind that tries to access an agency system. The strongest form of identity management is attribute-ba...
October 19, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
5G: The Transformation of Defense Networks
In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD...
October 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search