12 past events found
Back to Search Begin New Search Save Search Auto-Notify
From MFA to Zero Trust: Keeping Modern...
The physical boundaries of business have blurred. Many organizations now operate as virtual ecosystems with no borders. While this change has helped improve agency resiliency and workforce satisfaction, it upends the traditional security framework and increases risk across every other aspect of an organization. Utilizing a Zero-Trust framework can be an effective security strategy that doesn't compromise user experience or team productivity. A...
April 21, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Leading in Government IT: Answering Cri...
This conversation will explore and answer vital questions for the CIOs of today and tomorrow, including framing the best approaches for navigating people and processes. We’ll answer questions like: How should CIOs manage and lead their workforce? How can they best measure performance? What are the processes and methodologies (agile, lean, etc.) that are essential for CIOs? What does success look like?
April 18, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Unlocking the Potential of Federal Funding
Unprecedented amounts of funding through IIJA, the CHIPS Act and more will allow state and local governments to make massive investments in physical and digital infrastructure. But these funding opportunities prompt critical questions and challenges as agencies must think strategically about how to best use this money. Among them: How do you overcome major supply chain disruptions and make sure you have the resources to deliver? How can you en...
April 13, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Making AI Trustworthy
Artificial intelligence (AI) can deliver a wealth of benefits when used responsibly. It can also damage an organization's reputation and future performance if safeguards are not in place – these include ethical, accuracy, privacy and security. The stakes are even higher for governments – If agencies don't design their AI operations to be trustworthy, they potentially risk eroding the public trust. Join Government Technology on Marc...
March 30, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Keeping Connections Secure Across Hybri...
State and local governments are tasked with securely connecting one or multiple of five things to support mission-critical needs: People, locations, data, clouds and applications. With a renewed focus on government cybersecurity, agencies face increased pressure to keep those connections secure. There’s growing attention to the physical security of government data centers and an increase in the adoption of cloud strategies that explore v...
March 28, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Fast, Simple Grants Management
Grants compliance can be a heavy lift for any organization. With the recent influx of federal funding for state and local governments, grants compliance has only grown more complex. Agencies must navigate uniform compliance requirements while balancing program-specific requirements or risk losing grant funding, designation as a ‘high-risk grantee’ and audits. Trying to achieve compliance with outdated management systems only limits...
March 28, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Addressing the Cyber Security Prioritie...
Current guidance has laid out the cybersecurity priorities that federal agencies should adhere to for the upcoming fiscal year 2024 budget cycle. Civilian agencies will need to focus on making investments within the three cyber investment priority areas: Strengthening the Foundations of Our Digitally-Enabled Future, Deepening Cross-Sector Collaboration in Defense of Critical Infrastructure, and Improving the Defense and Resilience of Governmen...
September 29, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
AUSA Noon Report - Pivot To Readiness w...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Wednesday, 7 September, at 12:00 PM EDT, to hear a presentation by LTG R. Scott Dingle. Joined by CSM Diamond Hough, Dingle will discuss how U.S. Army Medical Command is reor...
September 7, 2022
Organizer: Association of the United States Army (AUSA)
Location: Webcast
Add Favorite
Cyber Electromagnetic Activities and Si...
"You go to the attack with the most advanced alignments, but you win with the side ones". Modern operations see even actual this quote in two new domains of warfare: electromagnetic spectrum and cyberspace. These new domains are potentially accessible from every classic one and represent dimensions that commanders have to schedule and use both during an operation by using 'Sensors' and 'Effector'. To plan a mission that takes into account acti...
March 11, 2021
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
An Overview of IADS (Integrated Air Def...
This one-hour webinar delivers an overview of Integrated Air Defense Systems (IADS). We will look at the evolution of IADS from WWII through the Vietnamese War to current times. We will spend some time on the North Vietnamese IADS and the US reaction to it since many of the key EW technologies were developed during this engagement. We will also look at the individual components of the IADS, early warning/ground control intercept (EW/GCI) radar...
January 14, 2021
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Back to Search Begin New Search