Implementing a System for Continuous Ri...
Threats are constantly evolving in the cyber world. Trying to keep up with them is an endless task especially when the available cyber tools also can’t keep up. Establishing a system of continuous risk management helps alleviate that pressure.Federal agencies recognize the scope of the problem. The Pentagon, for example, has released its new Cybersecurity Risk Management Construct, replacing its Risk Management Framework, cutting seven p...
December 10, 2025
Organizer:
FedInsider Location:
Webcast
Defending The Digital State: Protecting...
Since 2018 there have been more than 4,300 ransomware attacks on businesses, educational institutions, healthcare facilities, and federal/state/local agencies. While the majority have targeted businesses, the three remaining groups all tie to governmental responsibilities, especially at the state and local levels. This means that ransomware attacks continue to pose an existential threat to state governments, disrupting essential services, comp...
November 18, 2025
Organizer:
FedInsider Location:
Webcast
How to Translate AI into Stronger Cyber...
There have been plenty of articles warning of the cybersecurity risks posed by artificial intelligence (AI), whether it is bad actors – from hostile nation-states to cyber criminals – or new attack vectors caused by AI implementations. At the same time, numerous other reports point out that AI can strengthen cybersecurity. For agencies looking to incorporate AI into their systems, cybersecurity is a great place to focus. AI tools c...
November 13, 2025
Organizer:
FedInsider Location:
Webcast
Progress in Getting to Zero Trust
As the cyber threat landscape grows increasingly complex, pressure grows on agencies to implement Zero Trust architecture to protect their users, their data, and their systems. Among the obstacles: the need to modernize legacy systems, how to manage identity, and keeping up with both evolving threats and evolving compliance standards The administration is working on the preparation and release of ‘Zero Trust 2.0,’ with a focus on e...
November 7, 2025
Organizer:
FedInsider Location:
Webcast
Building on Cyber Strengths
Agencies have spent years working on cybersecurity, from implementing continuous diagnostics and mitigation to installing identity authentication and management tools to moving to a Zero Trust architecture. The challenge now is how to build on what is already in place to contend with a new threat landscape, including AI being used by hostile interests to circumvent current security measures. It is not about “ripping and replacing...
November 5, 2025
Organizer:
FEDINSIDER Location:
Webcast
Beyond Cyber - Navigating Global Market...
There is a critical conversation to be held on safeguarding U.S. critical infrastructure against persistent and evolving cyber threats. With global adversaries increasingly targeting power grids, communications networks, water systems, and other essential services, the urgency to fortify national cybersecurity has never been greater. Meanwhile, artificial intelligence, machine learning, and automation continue to evolve. Organizations must ret...
October 27, 2025
Organizer:
FedInsider Location:
Webcast
Strengthening Zero Trust Under Pressure
Zero Trust architecture is not an end state – it's a framework to support the continuous improvement of cybersecurity so that networks and systems can stay protected even as threats evolve. Instead of security models that crack under pressure, agencies need resilient architectures that get stronger when attacked. And that's what Zero Trust delivers. At the same time, organizations are faced with constrained resources and increasing manda...
October 16, 2025
Organizer:
FedInsider Location:
Webcast
Cyber Resilience in a Turbulent Environ...
Zero Trust architecture is not an end state – it’s a framework to support the continuous improvement of cybersecurity so that networks and systems can stay protected even as threats evolve. Instead of security models that crack under pressure, agencies need resilient architectures that get stronger when attacked. And that’s what Zero Trust delivers. At the same time, organizations are faced with constrained resources and incr...
October 16, 2025
Organizer:
FedInsider Location:
Webcast
Strengthening Cybersecurity Through Inn...
As artificial intelligence, machine learning, and automation continue to evolve, organizations must rethink information sharing, response coordination, and risk mitigation to strengthen the cyber ecosystem and reshape cybersecurity resilience. Among the challenges: balancing innovation with security, privacy, and ethical considerations as agencies navigate the ever-evolving cyber landscape. Join us as thought leaders from government and indust...
September 22, 2025
Organizer:
FedInsider Location:
Webcast
Hot Topics in Cybersecurity Day 3: The...
The federal mandate that agencies utilize a Zero Trust architecture to strengthen cybersecurity has been in place for four years, and most federal agencies have made excellent progress toward meeting the deadlines spelled out in the Executive Order. State and local governments are not covered by the federal EO, but many of them are pursuing their own zero trust policies or evaluating how to implement them. After all, having a zero trust archit...
September 18, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.