FCW Summit: What's Next for FedRAMP?
First floated as an idea in 2010, the Federal Risk and Authorization Management Program was officially launched in 2012 as a government-wide program to secure cloud products and services. A recent audit by the General Accountability Office showed that more than 900 government cloud projects have been authorized by FedRAMP, but hundreds more continue to operate without authorizations, which presents a kaleidoscope of security challenges to the...
FCW Workshop: Cloud Security
As agencies follow the administration's IT Modernization guidance and move more of their systems to the cloud, it's essential to protect the data from a host of evolving threats. There are a number of programs to help with the journey, however. The FedRAMP program is an important part of any agency’s cloud strategy, and it is providing a path and structure to the move by certifying cloud services providers so agencies have a trusted list...
FCW Summit: CDM
The Continuous Diagnostics and Mitigation program was created in 2012 with the vision that all federal networks should be continuously scanned to identify and respond to threats and breaches. A tremendous amount has changed in the years since, for both the program itself and the government networks it protects, but that central CDM mission remains. FCW's 4th Annual CDM Summit will bring together the top government program leaders and essential...
FCW Summit: Cybersecurity
Cybersecurity consistently tops the list of concerns that federal and state and local executives face every day. It affects their spending and their hiring. It is a major undertaking, shifting from a security paradigm focused on perimeter defense to a network-, application- and data-level security that’s inextricably enmeshed in the network. Among the challenges, agencies must determine how much of the lift they will shoulder and how muc...
FCW Summit: Emerging Tech
Putting New Tech into Action The government is often conservative about adopting new and cutting-edge technology—even when it funded the early development. The scale of the applications, the sensitivity of the data and the strategic importance of the agency missions have made federal IT executives cautious. Now a new generation of emerging technology offers particularly promising results—but what is mature enough to implement or pi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.