Back to Search Begin New Search Save Search Auto-Notify
Protecting Bring Your Own (BYO) Mobile...
The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) released a practice guide titled Mobile Device Security: Bring Your Own Device. This NIST gui...
June 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting BYO Mobile Devices within Ze...
ATARC Presents in Partnership with Zimperium An open discussion with experts from the National Institute of Standards and Technology (NIST), the MITRE Corporation, and U.S. Department of Defense. The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National...
June 9, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
ATARC 2021 Cybersecurity Innovations Summit
As Federal agencies have moved quickly in this past year to put innovative technology and solutions into place, the need to strengthen their cybersecurity capabilities and solve increasing cybersecurity challenges has grown ever more important. Aligning agency strategy to secure enabling technology infrastructure is even more crucial when coupled with the accelerated transition to remote and hybrid work environments. Agencies have been forced...
June 2, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Edge Computing – A Must for 5G and IOT...
As the federal government evolves into the “new normal” as a result of COVID-19, Federal data architectures have changed to adapt. Edge computing, alongside 5G and IOT, has created the opportunity for more efficient decisioning at the point of events. Data can be analyzed at near real-time speeds, accelerating decisions that impact critical missions and improve government operations. By collecting and processing data closer to the...
May 20, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Cyberattacks and the Path Forward
Join this webinar to hear from government and industry thought leaders about the recent cyberattacks, the lessons that were learned, and the path moving forward. The cyber threats faced by the private and public sector call for increased collaboration and cooperation across the IT industry, and with those responsible for defending countries from cyberattacks. Recent cyberattacks highlight the need for enhanced collaboration within the industry...
May 5, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
ATARC 2021 TIC 3.0 Virtual Summit
A collaborative event discussion around the already evidenced and future evolution of TIC 3.0 – and where agencies stand in their confidence to take steps towards its implementation. Listen as TIC 3.0 experts explain the importance behind it, as well as the solutions it is enabling. Hear from Federal cloud adoption leaders about their distinct use cases, including remote user access, modernization of branch offices, and network moderniza...
April 27, 2021
Organizer: ATARC
Location: Virtual
Add Favorite
IoT Security: Are We Keeping Pace with...
Connected devices are making their steadily increasing presence within the Federal government, helping with both mission delivery and citizen interaction. However, these smart cars, smart medical devices, even smart cities – represent brand new targets for hackers, requiring us to secure the many components in the IoT ecosystem: from sensors, industrial IoT devices and their interfaces; networks and clouds; to sophisticated software appl...
April 7, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Identity-Centric Security: The New Agen...
COVID-19 has accelerated the need for Privileged Identity Management (PIM). As remote agency workforces expand, there is little question that Privileged Identity Management will play an increasingly crucial role in mitigating cyber-attacks. Recent cyber breach news is a reminder that privileged credentials are highly targeted by threat actors. During this webinar, we’ll discuss: Why Privileged Identity Management is a cornerstone of mod...
April 1, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Defending Against Supply Chain Attacks
When faced with the increasingly frequent and damaging cyberattacks, it may feel like our current network perimeter defense is still relying on a ‘castle and moat’ like strategy. And this approach can in fact be an invitation for lateral movement of malware. For proper cyber defense, we need to know more than just WHO can access the network from an identity management perspective. It is imperative to lock down the entire applicatio...
March 30, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
The Impending Cybersecurity Pandemic-Is...
Organizational operations are more connected than ever with telework, cloud, IoT devices, industrial Control Systems (ICS), smart vehicles, medical devices, C2 systems, and more. All of this has fueled the fire for nation-state espionage and cybercrime which are at an all-time high. Recent events clearly demonstrate the complexity of attacks has increased. Government agencies don’t have to be caught off-guard – it’s survival...
March 25, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search