ATARC and FMG's Mobile Breakfast Summit
Join this breakfast webinar to hear experts discuss security features for mobile tools, technologies, products, 5G, and services; and examine how agencies can improve on enterprise-wide mobile security strategy and policy. What lessons have experts learned while working with 5G and the cloud? What challenges have they faced while modernizing their agency’s cloud services? What best strategies did they have to put in place to overcome the...
August 30, 2022
Organizer:
ATARC Location:
Washington, DC
8-Part Adobe Digital Learning Webinar S...
Taking the Classroom Online Preparing for a post-pandemic world while adapting to ever-changing circumstances is leaving organizations to embrace hybrid work schedules while continuing to navigate business continuity. Now more than ever, creating an engaging virtual learning environment is vital, and many organizations are navigating how to produce intriguing digital learning content and deliver it to any audience effectively and efficiently,...
Mobile Device Investigator Training
ADF Solutions is excited to offer a complimentary, hands-on, instructor-led training for Mobile Device Investigator® (MDI), and a free 6-month license and MDI User Certificate to all attendees upon completion of the training! Attendees will learn how to configure MDI, operate the mobile phone forensic software and interpret results. We are pleased to be offering the full-day training live in Reston, VA, with the option of attending one of...
GovForward ICAM Workshop
Identity takes center stage as zero trust implementations grow. Identity has been key to individual access to information for some time in government, but it has often been based on physical access cards. As the federal government now begins a move to accommodate more mobile devices in non-traditional environments, agencies are working to consolidate and update their identity systems to protect a broad range of access by individuals and device...
Don't Get Blindsided by Mobile Gaps in...
Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created apps, is a difficult undertaking. App Stores do not protect you from vulnerabilities. We can assist you in further developing your Mobile Application Risk Management program. From easily creating a Software Bill of materials for your existing mobile applications, to automating the vetting of all new releases from the app...
4-Part Adobe Webinar Series: Create Per...
Design Engaging Web Experiences In a digital-centric world, every interaction matters, especially on your agency's website since constituents rely heavily on them to find relevant information. So, how can your team easily, create, collaborate, and rapidly publish content—without coding—to create an accessible customer-focused journey? Join this session to uncover how to accelerate the adoption of digital services with accessible we...
Don't Get Blindsided by Mobile Gaps in...
Mobile Application Security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include Mobile App vetting is now upon us.Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created a...
Don't Get Blindsided by Mobile Gaps in...
Mobile application security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd party created...
Software Supply Chain Risk Management f...
Mobile application security is a real threat vector. Whether managing existing mobile apps or building your own, the need to test for vulnerabilities on a regular basis is more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd-party created apps, is a diffic...
Modernizing Authentication Through the...
Today’s workforce expects flexibility and mobile has been the technology that empowers employees to work wherever and whenever they want. Employees are constantly using new devices to access sensitive organization information with the expectation of a painless user experience. IT departments are faced with the challenge of meeting this expectation while also ensuring that only authorized and verified users are accessing this information....
March 10, 2022
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.