ATARC's Federal Mobility Summit
Ensuring robust mobile security is critical in today’s digital landscape, particularly with the increasing reliance on mobile technology for sensitive tasks. This discussion will delve into key aspects of mobile security, including identity management, zero trust architectures, and emerging threats. Participants will gain insights into best practices for protecting mobile infrastructure, safeguarding user data, and mitigating risks assoc...
September 19, 2024
Organizer:
ATARC Location:
Reston, VA
Police Fleet Expo
Join us at Police Fleet Expo 2024, where Police Fleet Managers gather alongside leading vehicle and equipment manufacturers and suppliers. Seize the opportunity to participate in the exclusive Expo dedicated to every facet of Police Fleet management. Don't miss out on this unique event! Monday, August 12 - Our renowned DriveX event kicks off the Expo at the beautiful Eagles Canyon Raceway located about 55 minutes away from the convention cente...
Empowering Troops and Enhancing Awarene...
Private wireless is significantly impacting modern warfare, fundamentally changing how battles are fought. Join us as we explore the transformative power of private wireless networks for military operations. Discover how dedicated, secure communication infrastructure is empowering troops on the ground and revolutionizing situational awareness through real-time data sharing, improved sensor integration and advanced augmented reality.
Zero Trust in Action: Approaches to Mob...
Government agencies increasingly rely on mobile devices, making endpoint security crucial. This panel features government officials discussing innovative strategies to address mobile cyber threats within a Zero Trust framework. Learn how mobile security is vital to enhancing the effectiveness of a Zero Trust Architecture, providing stringent verification mechanisms to ensure the integrity of user and device access to critical resources. From i...
Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer:
FedInsider Location:
Webcast
Sponsored Content: FEDERAL FORECASTING...
Sponsored Content WebinarDV SOLUTIONS During this webinar, we'll highlight the following key points: Partnerships: We are inviting Primes, Apex Accelerators, Chamber of Commerce’s, Small Business Organizations and SMEs to partner with the Federal Forecasting App. Category & Subcategory Management: Partners would have their own dedicated categories & subcategories. Partners would have access to push notification features, current...
Future G For Defense
DSI’s inaugural FutureG for Defense Summit will bring together DoD, Federal Government, Private Industry, & Academia to discuss goals & initiatives toward accelerating the adoption of transformative 5G and future generation wireless networking technologies to offers faster speeds, more bandwidth, and the ability to customize network operations in support of specific mission needs. The integration of these technologies will also b...
DoD Investing in the Future of 5G
Communications security is one of the foremost priorities in any battlespace. This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly. Its ability to handle massive amounts of data makes it a crucial component in real-time data collection from all sources,...
October 20, 2023
Organizer:
FedInsider Location:
Webcast
Using NIST Guidance to Manage Security...
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout...
October 12, 2023
Organizer:
ATARC Location:
Webcast
Zimperium- How Hackers Bypass MFA ... A...
Multi-factor authentication (MFA) is a key component to achieving Zero Trust, as it adds a secondary line of protection before allowing access to networks, applications, or databases. However, malicious actors have found ways to bypass this control through sophisticated SMS-based attacks, device compromises, malware and even network attacks. Join Zimperium and RSA for a discussion on how advanced mobile threat defense (MTD) solutions, either s...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.