28 past events found
Back to Search Begin New Search Save Search Auto-Notify
Fraudulent Behavior and How ICAM Can Assist
The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities. With scams, identity theft, and impersonators at an all-time high, the Federal Government has developed policies and training to prevent attacks. As a result, risk management strategies and internal control systems are implemented, monitored, and modified as necessary by management and governing bodies. A successf...
February 23, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Building for Secure MultiCloud Environm...
Embracing a decentralized modern enterprise IT ecosystem means accepting that mission critical workloads don’t just run inside of the data center. Modern customer and employee experience demands from the business are rapidly forcing IT leaders to adapt to a hybrid environment approach. Application and data are increasingly spread among multiple agencies, legacy data centers, hyperscaler clouds, software as a service (SaaS) providers, and...
November 1, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Using IOT and AI to Transform Operation...
If your agency’s day-to-day operations are critically dependent on assets – such as processing equipment, facilities equipment, and infrastructure at large repair sites – maximizing uptime is a constant challenge. Without timely maintenance, equipment failure can be catastrophic, directly impacting operations and reducing mission readiness. The traditional approach of scheduled manual periodic checks and asset condition repor...
August 18, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Building for Secure Multicloud Environm...
Embracing a decentralized modern enterprise IT ecosystem means accepting that mission critical workloads don’t just run inside of the data center. Modern customer and employee experience demands from the business are rapidly forcing IT leaders to adapt to a hybrid environment approach. Application and data are increasingly spread among multiple agencies, legacy data centers, hyperscaler clouds, software as a service (SaaS) providers, and...
June 22, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Impact of AI and Machine Learning on Fi...
Financial regulators and law enforcement agencies were already stretched thin investigating huge volumes of suspicious activity reports filed annually by financial institutions. This problem has become incredibly hard with the rising number of cybercrimes and cryptocurrency crimes, as well as the need to monitor and enforce new Russian sanctions that are historically unprecedented in scale and scope. Government agencies are struggling to cope...
May 26, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Dear Security, Compliance, and Auditors...
DevOps solved the Developer and Operators conflict, although forgot other essential folks of the delivery lifecycle: Security, Compliance, and Audit. DevSecOps is an excellent reminder that security must be “DevOps’d,” but compliance and audit are missing. No need for any more DevSecAuditComplianceOps buzzwords. Let’s simply talk about Continuous Authorization. It’s best to think of continuous authorization as Zer...
December 16, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Making IT Service Management and Securi...
It’s no secret that getting a clear picture of your hardware, software, and services can be a challenge. Federal IT leaders frequently list vendor audits and unexpected software license true-up as a top concern. Add to the mix – constant adaptation to changing technologies, cyber-attack vulnerability mitigation, and IT asset availability and management in complex hybrid environments – and you start to uncover the challenges i...
October 7, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Why Operational Technology and IT Manag...
In today’s traditional Operational Technology (OT) management environment, organizations use outdated software that does not scale to the demands of the modern digital environment. Organizations have struggled to efficiently secure, monitor and manage an Operational Technology environment. This along with a lack of effective systems management leaves OT systems open to significant cyber attack risk and financial impact. How can organizat...
October 5, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Hear From the Authors: Federal Zero Tru...
Among other Federal Government initiatives, the Executive Order 14028 of May 2021, “Improving the Nation’s Cybersecurity” triggered the creation of three documents, critical to helping agencies to adopt zero trust cybersecurity principles and adjust their network architectures accordingly. The Office of Management and Budget (OMB) has released a draft Federal Zero Trust Strategy, to adapt and accelerate civilian agencies...
September 23, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
ATARC Integrated Cyber Strategies Virtu...
Strengthening the Federal information and communications infrastructure is essential to our national security and economic prosperity. Consequently, significant resources are being allocated to this effort. How then do agencies tackle the challenges they have long faced– legacy system interoperability, multi-vendor integration, and the rapid evolution of technologies and dynamic cybersecurity threats? In this session, learn how agencies...
March 23, 2021
Organizer: ATARC
Location: Virtual
Add Favorite
Back to Search Begin New Search