Back to Search Begin New Search Save Search Auto-Notify
How to Get Your Security Aligned with t...
Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet. Among best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines the b...
July 9, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Mission-Centered Design for Real World...
Join us for a dynamic FedInsider discussion on how mission-centered system design can transform public sector services into improved, outcomes-driven models. As expectations around cost reduction and efficiencies continue to drive change, government and industry leaders must go beyond incremental improvements to reshape how citizen experiences are designed and in fact delivered. This webinar will explore how focusing on mission outcomes can pr...
July 8, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Mobile Security Series: Securing the Hu...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Mobile Security: The Human Layer is the...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Talking Tech: Simplifying STIG Complian...
The U.S. Department of Defense uses security standards that are set forth in its Security Technical Implementation Guide (STIG) to help protect its systems and networks. By implementing unified automation, which integrates automated tools with the STIG standards, DoD can improve system-level control compliance throughout the software lifecycle. From reduced timelines and improved reliability to sustainable ATO processes, unified STIG automatio...
June 26, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
The Strategy Behind Meeting CMMC Requirements
The purpose of the Cybersecurity Maturity Model Certification is to have in place the security and privacy controls that give information systems greater resilience in the face of a wide range of dangers, including malicious attacks, natural disasters, structural shortcomings, human error, and hostile nation-state surveillance. The catalog of controls is laid out in the National Institute of Standards and Technology Special Publication 800-53...
June 24, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
AI Branches Out into New Solutions
Since the launch of ChatGPT in late 2022, artificial intelligence has rapidly evolved into multiple specialized and mission-focused tools. Generative AI, multimodal AI, and agentic AI are no longer just concepts—they’re transforming how agencies approach everything from data analysis to decision support. Each branch brings unique capabilities and challenges. Generative AI helps automate content creation, multimodal AI enables riche...
June 18, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
The Path to Modernization and Productiv...
The introduction of cloud has remade the government IT landscape. In the early days of government adoption, cloud was seen as a cost-saving measure as agencies were encouraged to move their on-premises data centers to the cloud, reducing dependence on legacy storage and real estate expenses. But as the technology has evolved and agencies have adopted more cloud solutions, it has become clear that it can provide a better experience for employee...
June 12, 2025
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Humans + AI = Prioritizing Higher Value Work
The federal government has been incorporating new technologies into its operations for decades, looking to streamline processes and add functionality. The introduction of artificial intelligence (AI) into the government IT ecosystem is not, by itself, something new, but employees are not yet clear on how AI will make their work better. The World Economic Forum recently suggested that “AI’s real power lies in reimagining workflows a...
June 10, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Overcoming Infrastructure Challenges: H...
When Baltimore’s Francis Scott Key bridge collapsed in March 2024 after it was struck by a container ship, it provided a harrowing – and deadly – demonstration of the fragility of aging U.S. infrastructure. The danger of aging infrastructure is compounded by workforce shortages, funding constraints and increasing demands, pushing transportation agencies at all levels—whether a municipality, city, county, or state depart...
June 4, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search