Continuous Diagnostics and Mitigation (...
The Continuous Diagnostics and Mitigation (CDM) program is a way government agencies move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to provide government agencies with risk-based cybersecurity solutions to protect federal civilian networks across organizational tiers. Specifically, CDM helps federal agencies identify cybersecurity risks, prioritize those risks, and enable staff to focus on those prior...
Update: Continuous Diagnostics And Moni...
The Continuous Diagnostics and Mitigation (CDM) program is the way government agencies move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to support government-wide risk-based cybersecurity solutions to assist participating agencies improve their security posture consistently and cost-effectively. In this virtual workshop, government & industry experts will provide the following: a status update on CD...
How to Quantify the ROI of your Data St...
Are you getting more time back than you put in with your analytics project? How long does it take to onboard a new dataset? Who views what dashboards and for how long? These, and other questions will better help you understand the value of the data and analytics routinely put together on projects. Often, these questions will unlock different understandings of what is extremely valuable and what may not be important at all, not just from the im...
Embracing Strategic Portfolio Management
Enter the newly created Strategic Portfolio Management market research area that has elevated IT Portfolio Management to a higher level. This presentation will talk about the changes organizations and agencies will face in order to realize the value from being strategic in their actions, their responsibilities, and the continuous monitoring of strategic portfolios. From the senior executives to the data stewards, this session will outline how...
Ascending the Summit to Enhance the Cit...
Across the country, governments are putting a stronger emphasis on digital services. With more and more citizens online and eager to communicate digitally, federal, state, and local governments must rise to the occasion. Join us for this session as we explore how agencies can transform the digital citizen experience to enhance speed, flexibility, convenience, and personalization of government services. You’ll learn about: What citizens t...
Zero Trust Implementation Case Study
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include guidance for zero trust architectures. This virtual workshop will focus on actual Zero Trust implementations, and the associated lessons learned.
Zero Trust: The Fundamentals
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
FOIA Automation
Since 1967, the Freedom of Information Act (FOIA) has provided the public the right to request access to records from any federal agency. Federal agencies are required to disclose any information requested under the FOIA, unless it falls under one of nine exemptions which protect interests such as personal privacy, national security, and law enforcement. In recent years, federal agencies have been inundated with FOIA requests creating challeng...
The Fundamentals of Cloud Security
Government wide pressure to reduce IT costs and optimize operations has led many agencies to embrace cloud computing. Despite the potential savings and improved efficiencies, securing the cloud remains a major concern. Cloud Computing Security can be defined as defending the confidentiality, integrity, and availability of agency assets (data, applications, infrastructure) using cloud services from both outside and insider threats. Securing the...
Implement the New NIST RMF Standards an...
The new Presidential Executive Order has increased emphasis on advancing toward “Zero-Trust Architecture” and “Endpoint Detection and Response (EDR)”, and moving systems to FedRAMP clouds. Additionally, NIST has released the finals of many Risk Management Framework (RMF) standards (SP800-53 Rev 5 – Security Controls, SP800-53B – Security Control Baselines, Privacy Framework, SP800-160 Vol 2 – Systems S...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.