Ensuring Reliability: A Guide to Testin...
We understand that critical errors and broken dashboards can occur at any time, posing significant risks to your business operations, especially during migration or upgrade processes. Our expert-led session will provide you with practical strategies and techniques to mitigate these risks effectively. Join us as we delve into the crucial aspects of testing, certifying and building trust in your Tableau dashboards. During this webinar, attendee...
How Digital Playbooks Propel Federal Mo...
Successful federal modernization requires an artful blend of people, process, and technology—with a relentless focus on enabling business transformation. A “digital playbook” can provide a comprehensive guide to the process, describing both overarching strategy and tactical approaches. Using a templatized technology strategy can boost mission outcomes while humanizing data-driven modernization and leveraging artificial intell...
April 25, 2024
Organizer:
FedInsider Location:
Webcast
NIST CSF 2.0 - A Playbook for Supply Ch...
Digital supply chains are complex and critical systems. In a rapidly evolving cyber landscape, supply chain security remains a top concern for organizations looking to solidify their protection strategies. Many organizations look to NIST for direction when setting their cybersecurity strategy. The new version of the Cybersecurity Framework (CSF 2.0) has recently been released and provides best practices to help navigate the evolving threat lan...
CTO Sessions: Quantum-Resistant Code Signing
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a requirement to support them by 2025. SP 800-208 requires that all stateful HBS key generation and signature algorithms b...
UEM Innovation Update: How BlackBerry H...
Join BlackBerry and Carahsoft for a live webinar providing a fresh look at protecting federal networks and data with UEM updates and key differentiators. In this webinar, attendees will learn about BlackBerry’s upgrades to the UEM platform, including: Enhanced Security for Multiple Deployment Models (COPE, BYOD, etc.) Increased Productivity / UX for Daily Tasks with Microsoft Intune Integration Real-Time Mobile Threat Defense for All Sec...
Seizing the Right Evidence, Anywhere
State and Local law enforcement officers often encounter unique challenges when collecting digital evidence. This webinar focuses on navigating unconventional crime scenes, from **inside a suspect's home** to remote locations like woods or parking lots. Register now to join ADF as they delve into critical considerations for State and Local agencies. Specifically, you will learn how to: Effectively secure digital evidence in diverse environment...
AO Perspectives: Managing Risks and Str...
Picture this: you're on the brink of securing that crucial ATO approval, but the path is fraught with pitfalls—complex regulations, potential human errors, and the constant specter of cyber threats lurking in the shadows. As an Authorized Official (AO), you're all too familiar with the uphill battle of navigating the complexities and risks of the ATO package approval process while maintaining the resilience of your organization's defense...
Quantum Readiness: Effective Strategies...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum Computing Cybersecurity Preparedness Act (H.R. 7535) requires federal agencies to prepare now to protect National Security Systems. Specifically, government agencies must maintain an inventory of all information technology in use that...
Connecting the Unexpected: Scalable Dat...
Driven by enterprise mission needs, organizations are attempting to address their end-state requirements with data relevant to the questions they need to answer. The scale and complexity of this data continue to create challenges for agencies, such as: which data is relevant to my problem set? What are we trying to answer with the data? And most importantly, how does this apply to my organization’s overall mission? Knowledge Graphs, wit...
Reduce Risk, Enhance Response: Ransomwa...
Every year, ransomware continues to be a persistent and evolving threat in the realm of cybersecurity. As technology advances, ransomware adapts, making it essential for state and local government to stay vigilant and implement robust security measures. The impacts of ransomware extend beyond financial losses, encompassing data breaches, reputational damage, and operational disruptions. Defending your agency against these threats requires pro...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.