Back to Search Begin New Search Save Search Auto-Notify
Bringing Agility to the Modern Security...
Modern security threats are evolving at a faster pace than security technologies, while well-funded threat actors are investing in tools like machine learning (ML), automation, and artificial intelligence (AI). Legacy security operations centers – SOCs – are not equipped with the tools to respond to this rapidly evolving landscape, even as the volume of traffic and data grow exponentially. These challenges also come as many agencie...
July 19, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Breaking Down Data Silos: Leveraging Ad...
In today’s digital age, government organizations are collecting more data than ever before. However, many agencies are struggling to make sense of this data, which is often siloed across different departments, systems, and classifications. Enterprise-level data analytics offers a solution to this problem, allowing government organizations to break down data silos and gain a more comprehensive view of their operations. Join us as topic ex...
July 13, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Elevating Benefits Management: Redefini...
The federal government has continued to refine current standards to better fit the needs of American people. Millions of Americans heavily rely on government-funded benefit programs to maintain their livelihoods. The stresses and burdens that come with interacting with the government, such as needing the services of Medicaid, Supplemental Nutrition Assistance, Social Security, etc. need to be eliminated in order to elevate the customer experie...
June 29, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting Critical Infrastructure with...
Modern cybersecurity measures such as post-quantum cryptography (PQC) and zero trust architecture (ZTA) are essential to protect U.S. critical infrastructure and ensure a resilient nation. And with a flurry of comprehensive initiatives coming from the Executive Branch, Pentagon, NSA, and NIST, it can be challenging for U.S. government CIOs and CISOs to determine where to prioritize resources. But PQC and ZTA aren’t mutually exclusive: ef...
June 22, 2023
Organizer: ATARC
Location: Virtual
Add Favorite
Navigating Complexity with Hybrid Clouds
A recent study concluded that government agencies are deploying mixed-IT environments - whether on-prem, public cloud, CSPs, MSPs, edge, colocation - at a high rate and that hybrid multicloud is projected to grow almost 5 times over the next three years. Government agencies are rethinking their cloud strategies to meet evolving priorities and mandates and how to address this complexity, especially in the face of IT staffing and skills shortage...
June 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Learning From log4j: How to Keep Govern...
When the log4j vulnerability was first identified in late 2021, the Cybersecurity and Infrastructure Security Agency responded very rapidly, including giving all federal agencies less than a week to identify and patch all their affected systems, and coordinating a nationwide response to encourage the private sector to do the same. But the vulnerability is likely to dog agencies and the private sector alike for years. There are at least two rea...
June 21, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How The Government Can Stay Ahead of Sp...
In the digital age, government agencies face increasing threats from spyware that can compromise sensitive information and undermine national security. To combat this, many government organizations are taking proactive measures by implementing executive orders and directives to ban specific applications on their mobile devices. However, this approach presents challenges in terms of scalability, visibility, and keeping up with rapidly evolving...
June 15, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Streamlining Security Authorization Thr...
Federal agencies must undergo the complex and laborious process of security authorization to operate (ATO) for each information system (IS) in accordance with the Federal Information Security Modernization Act (FISMA). Currently, most agencies rely on manual documentation processes. These include popular productivity tools to capture the applicable security controls and the status/plans of implementation of the controls for each IS as well as...
June 1, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Government Customer Experience & Engage...
Government agencies are responsible for protecting public trust, delivering excellence in services, and, above all else, upholding the promise of government. Through a combination of the lessons learned from rapidly evolving hybrid work environments, exposed inequities in pandemic responses, and bolstered federal guidance in the Biden Administration’s Executive Order, the 21st Century Integrated Experience Act (IDEA), among others, agenc...
June 1, 2023
Organizer: GovExec 360
Location: Washington, DC
Add Favorite
Cyber Resilience for Modern, Agile, and...
Today’s cybersecurity threat landscape means Federal professionals must take a proactive and practical approach to defending agency personnel, systems, networks, and data. IT infrastructures need resiliency that is built in, understood by the workforce, and prepared to work beyond the next threat. Creating a resilient IT architecture is not an admission of anticipated defeat. Rather, it’s insurance against probable events and incid...
May 25, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search