35 past events found
Back to Search Begin New Search Save Search Auto-Notify
Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
DoD Investing in the Future of 5G
Communications security is one of the foremost priorities in any battlespace. This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly. Its ability to handle massive amounts of data makes it a crucial component in real-time data collection from all sources,...
October 20, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Securing the Remote Workforce – A Movin...
When the first lockdown orders in response to the COVID-19 pandemic were issued in March 2020, many agencies at all levels of government had to scramble to accommodate large numbers of their workers suddenly teleworking. The importance of implementing securing zero-trust security methodology (or architecture)– maintaining strict access controls and not trusting any user automatically, whether inside or outside the network perimeter ...
April 1, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Government’s Strategic Roadmap to Edge...
IDC defines edge computing as processing that is done at or near the source of government data, which secures and reduces data transport time as well as network traffic. Growing adoption of Internet of Things (IoT) tools such as traffic sensors, security cameras, and building security devices is creating 95% of the growth in network traffic. The value of edge computing spans an ever-widening number of missions. For example, adding data analyti...
March 18, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity: The Foundation of Mobile Security
Digital transformation of government agencies across the board has resulting in an explosion of digital services, and the recent move to telework with widespread delivery of citizen services online has only further increased the impact. National Institute of Standards and Technology, has established digital identity guidelines that lower the risk and assure the appropriate level of confidence to prevent impersonation and other attacks. As tech...
March 4, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Intersection of CDM and Mobile Secu...
According to recent government analysis, of the 2.6 billion visits to government websites in the past 90 days, nearly half came from a mobile device — 42 percent from a phone and 6 percent from a tablet. But the explosive use of mobile technology goes beyond citizens to the heart of government itself. This webinar will explore how agencies are using continuous diagnostics and mitigation to improve government’s overall security post...
December 13, 2018
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Exploring the Full Spectrum of Mobile R...
Mobile technologies are a major catalyst for the rapid changes taking place in government I.T., underscoring the need for enterprise-wide security protection. The Administration has established clear priorities to secure government data by greater protection of high value assets, consistent security criteria for movement to the cloud, and, importantly, the development of comprehensive security solutions for mobile devices. Verizon’s annu...
May 22, 2018
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Securing Federal Mobility From The Full...
Government mobile users are being targeted by hackers who are seeking an avenue to attack back-end computer systems that contain the data of millions of Americans. Security operations centers now deal with a variety of cyber vectors including man-in-the-middle attacks, errant apps, adware, ransomware, and attempts to root mobile devices. A recent study by the U.S. Department of Homeland Security says threats to mobile devices range from those...
August 24, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Managing Mobility To Deliver Anywhere,...
Federal use of mobile technologies continues to mature. Since the advent of the mobile government movement, agencies have developed more effective security policies, clarified their choices of eligible mobile devices, and built a number of mobile applications for agency use and for deployment to the public. This webinar will explore the management and policy issues surrounding mobile devices and how to deliver government’s mission more e...
April 13, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Managing Mobility to Deliver Anywhere,...
Federal use of mobile technologies continues to mature. Since the advent of the mobile government movement, agencies have developed more effective security policies, clarified their choices of eligible mobile devices, and built a number of mobile applications for agency use and for deployment to the public. This webinar will explore the management and policy issues surrounding mobile devices and how to deliver government’s mission more e...
March 23, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search