From MFA to Zero Trust: Keeping Modern...
The physical boundaries of business have blurred. Many organizations now operate as virtual ecosystems with no borders. While this change has helped improve agency resiliency and workforce satisfaction, it upends the traditional security framework and increases risk across every other aspect of an organization. Utilizing a Zero-Trust framework can be an effective security strategy that doesn't compromise user experience or team productivity. A...
Leading in Government IT: Answering Cri...
This conversation will explore and answer vital questions for the CIOs of today and tomorrow, including framing the best approaches for navigating people and processes. We’ll answer questions like: How should CIOs manage and lead their workforce? How can they best measure performance? What are the processes and methodologies (agile, lean, etc.) that are essential for CIOs? What does success look like?
Unlocking the Potential of Federal Funding
Unprecedented amounts of funding through IIJA, the CHIPS Act and more will allow state and local governments to make massive investments in physical and digital infrastructure. But these funding opportunities prompt critical questions and challenges as agencies must think strategically about how to best use this money. Among them: How do you overcome major supply chain disruptions and make sure you have the resources to deliver? How can you en...
Making AI Trustworthy
Artificial intelligence (AI) can deliver a wealth of benefits when used responsibly. It can also damage an organization's reputation and future performance if safeguards are not in place – these include ethical, accuracy, privacy and security. The stakes are even higher for governments – If agencies don't design their AI operations to be trustworthy, they potentially risk eroding the public trust. Join Government Technology on Marc...
Keeping Connections Secure Across Hybri...
State and local governments are tasked with securely connecting one or multiple of five things to support mission-critical needs: People, locations, data, clouds and applications. With a renewed focus on government cybersecurity, agencies face increased pressure to keep those connections secure. There’s growing attention to the physical security of government data centers and an increase in the adoption of cloud strategies that explore v...
Fast, Simple Grants Management
Grants compliance can be a heavy lift for any organization. With the recent influx of federal funding for state and local governments, grants compliance has only grown more complex. Agencies must navigate uniform compliance requirements while balancing program-specific requirements or risk losing grant funding, designation as a ‘high-risk grantee’ and audits. Trying to achieve compliance with outdated management systems only limits...
Addressing the Cyber Security Prioritie...
Current guidance has laid out the cybersecurity priorities that federal agencies should adhere to for the upcoming fiscal year 2024 budget cycle. Civilian agencies will need to focus on making investments within the three cyber investment priority areas: Strengthening the Foundations of Our Digitally-Enabled Future, Deepening Cross-Sector Collaboration in Defense of Critical Infrastructure, and Improving the Defense and Resilience of Governmen...
September 29, 2022
Organizer:
ATARC Location:
Webcast
AUSA Noon Report - Pivot To Readiness w...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Wednesday, 7 September, at 12:00 PM EDT, to hear a presentation by LTG R. Scott Dingle. Joined by CSM Diamond Hough, Dingle will discuss how U.S. Army Medical Command is reor...
Cyber Electromagnetic Activities and Si...
"You go to the attack with the most advanced alignments, but you win with the side ones". Modern operations see even actual this quote in two new domains of warfare: electromagnetic spectrum and cyberspace. These new domains are potentially accessible from every classic one and represent dimensions that commanders have to schedule and use both during an operation by using 'Sensors' and 'Effector'. To plan a mission that takes into account acti...
An Overview of IADS (Integrated Air Def...
This one-hour webinar delivers an overview of Integrated Air Defense Systems (IADS). We will look at the evolution of IADS from WWII through the Vietnamese War to current times. We will spend some time on the North Vietnamese IADS and the US reaction to it since many of the key EW technologies were developed during this engagement. We will also look at the individual components of the IADS, early warning/ground control intercept (EW/GCI) radar...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.