Back to Search Begin New Search Save Search Auto-Notify
Amplifying Federal Efficiency with AI-P...
The federal government expends significant resources on manual data processing and entry, which is not only time-consuming but also error prone. Technological advancements now empower agencies to streamline data processing and extract valuable insights from their document repositories, enhancing efficiency and accuracy. Join Digital Government Institute (DGI), Hyland and Amazon Web Services for a webinar exploring the application, benefits, an...
November 7, 2023
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Unleashing the Power of Active Event Ma...
Alchemy Global Networks recognizes that most Security Information and Event Management (SIEM) solutions face challenges such as poor asset intelligence and immature or nonexistent process workflow automation. These lead to a population of unmanaged systems that render the SIEM an expensive "event collector." The event management system is the "brains" of cloud and/or data center services as it collects, aggregates, and correlates data while re...
September 27, 2023
Organizer: AGN Team at Carahsoft
Location: Webcast
Add Favorite
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Strengthening Federal Software Infrastr...
Participate in an insightful panel discussion as we delve into the crucial topic of federal software supply chain modernization and compliance standards for Software Bill of Materials (SBOMs) in line with The President’s Executive Order 14028. This webinar aims to address the challenges faced by federal agencies, share best practices, explore avenues for improving efficiencies, and establish a compliance standard for SBOMs in the softwar...
August 24, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Identity - One Critical Element of CISA...
When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as “an attribute or set of attributes that uniquely describes an agency user or entity,...
August 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust: Driving Transformation and...
Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize th...
August 10, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
How to Solve Common Healthcare Workflow...
Are you looking for a medical device that supports your team’s daily tasks and improves patient care? If so, you might be interested in the Zebra ET4X-HC Medical Tablet. Join us for a complimentary webinar to learn how the Zebra ET4X-HC can help streamline workflows, increase operational efficiency, and reduce administrative burden. You will also learn how the Zebra ET4X-HC can help you overcome some of the common challenges and bottlene...
July 27, 2023
Organizer: Zebra Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing Access to Data: An Exploration...
In today’s interconnected and rapidly evolving digital landscape, ensuring secure access to sensitive resources is of paramount importance. There are various methods of securing data and Federal agencies have explored a majority of them. Identity, Credential, and Access Management (ICAM) and Attribute-Based Access Control (ABAC) have emerged as two prominent frameworks that enable organizations to address the challenges associated with a...
July 20, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search