CISO Handbook: Why Agencies Need Visibi...
Cyber threats have posed interesting challenges and opportunities to both the private and public sectors. But what are the best practices when implementing new risk management solutions? During this exclusive webinar, Ron Ross, fellow, National Institute of Standards and Technology, will discuss cybersecurity and software security engineering. Jeff Williams, CTO and co-founder, Contrast Security, will provide an industry perspective. Learning...
Why Zero Trust Starts With People
It’s become clearer over the last two years that people are the first and last line of defense when it comes to cybersecurity. But how can organizations strike the right balance of cybersecurity, and data and application accessibility as risks and threats change? During this exclusive webinar, cybersecurity leaders will discuss best practices for this people-centric approach to zero trust. Learning objectives: Zero trust in a hybrid and...
Preparing for Large-Scale Events
How can technology play a role in helping organizations prepare for large-scale events? During this exclusive webinar, public sector leaders will discuss their considerations, challenges and strategies when planning technology initiatives and security for large-scale events. Learning objectives: Considerations for planning for large-scale events Evaluating data for event strategies Utilizing mobile alerts and technology
DoD Cloud Exchange
Digital transformation is a buzz phrase throughout the Defense community and the government at large. But in a three-day event on March 22, 23 and 24, Federal News Network will take a deep dive into what each of the military departments is really trying to achieve, and what they’ve accomplished thus far. This time, we’ll expand the discussion we started with the 2021 Federal News Network DoD Cloud Exchange by discussing not just wh...
Updating DoD’s Military Health IT Systems
During this exclusive webinar, Pat Flanders, chief information officer of the Defense Health Agency, will discuss how the agency is modernizing and integrating IT systems previously managed by the Air Force, Army and the Navy—to securely support military healthcare services worldwide, on the battlefield and off. Ravi Bahti, head of solution engineering for DoD and aerospace at MuleSoft, Jennifer Luong, strategic security architect at Mul...
Federal News Network Industry Exchange: Cyber
Join Federal News Network on Jan. 31 and on Feb. 7 for our inaugural Industry Exchange event. We’re kicking off 2022 with a focus on cybersecurity: intelligence, endpoint management and remediation, identity security, cybersecurity asset management, security orchestration and response. Industry experts will share the latest insights on these and other security issues critical to the government. This is a demanding time for agencies. Fede...
Federal News Network Industry Exchange: Cyber
Join Federal News Network on Jan. 31 and on Feb. 7 for our inaugural Industry Exchange event. We’re kicking off 2022 with a focus on cybersecurity: intelligence, endpoint management and remediation, identity security, cybersecurity asset management, security orchestration and response. Industry experts will share the latest insights on these and other security issues critical to the government. This is a demanding time for agencies. Fede...
Securing the Government’s Digital Suppl...
Many people think of cybersecurity as threats coming from the outside, but with the government relying on private companies to provide hardware and software, the very tools that agencies use could be a threat within themselves. During this exclusive webinar, Stephan Mitchev, director off the Office of Application Engineering and Development and acting chief technology officer at the Patent Office, will discuss how the Patent Office is taking a...
CISO Handbook
Most are familiar with the Coast Guard as an institution, but many may not know about the operations of the Coast Guard Cyber Command. During this exclusive webinar, Captain John Henry, operations officer of the Coast Guard Cyber Command, will discuss how the Cyber Command prepares for and responds to cyber incidents. Justin Tolman, forensic subject matter expert at Exterro, will provide an industry perspective.
What Role Does Identity Play in Zero Trust
Two things have become abundantly clear over the last few years. First, zero trust is more than a buzzword as more and more public and private sector organizations move toward this mindset. Second, identity and access management is not only back in vogue, but it’s a key foundational piece of moving toward the end goal of a zero trust environment. During this exclusive webinar, technology executives will provide insights and examples of h...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.