39 past events found
+ 2 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Operationalizing Zero Trust: Securing C...
In the rapidly evolving landscape of cybersecurity, the Zero Trust model has emerged as a cornerstone principle, dictating that trust must never be implicit and must be continually earned. This webinar, “Operationalizing Zero Trust: Securing Containers in Runtime,” delves into the practical applications of Zero Trust architecture within live container workloads, an area fraught with potential vulnerabilities and attack vectors. Joi...
April 4, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
The Use of Artificial Intelligence (AI)...
On January 9, 2024, the ATARC Insider Risk Working Group conducted its first webinar on the use of Artificial Intelligence (AI) in Insider Risk Programs. During that webinar, panelists explored the use of AI as a critical tool in support of Insider Risk programs in Government, Industry, and Academia. In the second part of this conversation, panelists will discuss Culture, AI, and Insider Risk, and how and why to use AI in Insider Risk Programs...
March 19, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
2024 Vision: Elevating Federal Security...
In today’s digital landscape, where cloud applications play a central role in every enterprise and artificial intelligence fuels rapid innovation, the need for a sophisticated cybersecurity strategy is paramount. With cloud applications at the heart of every digital enterprise and AI-led development certain to accelerate innovation, organizations require an intelligent cloud approach to security that’s intuitive for users and highl...
January 25, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Mission Driven Observability: Enhancing...
Federal agencies need more support to implement modern monitoring tools that help improve their threat detection and response. But how can agencies achieve the resilience required for today’s cyber threats? It starts with prioritizing an observability strategy. In this webinar, experts will discuss the importance of an observability strategy to improve SIEM performance and costs, optimize security information and event management, and ho...
January 18, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Multicloud Working Group Meeting
The Multicloud Working Group’s mission is to share broadened definitions, understanding and best practices around ‘Multicloud’ and ‘Multicloud Operating Model’ in today’s multicloud ecosystem. This enables public sector organizations to understand and contend with the Day 2 operational complexities of the multicloud operating model they will encounter as they adopt and scale application, data, user experienc...
December 22, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Partnerships in Cybersecurity Education...
Cybersecurity education and workforce development is a significant issue given large current national capability and skills gaps. In this webinar, we bring together key partners and major stakeholders from the public sector, private sector, and academia to discuss pathways of collaboration and partnerships moving forward to solving this important problem. Panel members will discuss their experience and “best practices” to reduce th...
November 7, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
A Look at Evolving Insider Risk Programs
Insider Risk Programs have continued to evolve naturally over the past 20 years. They have grown exponentially beyond the traditional lens of trying to identify spies through cyber-focused data exfiltration events. Today, Insider Risk Programs have expanded to include internal HR, legal, and compliance stakeholders within organizations and have expanded security beyond strictly physical and cyber domains to now include analysts, investigators,...
October 24, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Zero Trust: Driving Transformation and...
Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize th...
August 10, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search