Back to Search Begin New Search Save Search Auto-Notify
AI in Government - What It Really Takes...
AI in Government is hosting guest speaker Kevin Mills, Head Global Government Partnerships at Coursera presenting ‘What it Really Takes to Get AI Skills: Making AI and Data Knowledge a Reality in Government’ on Tuesday, April 19, 2022 from 12 PM - 1 PM ET! As organizations in both the public and private sectors are grappling with the digital skills gap within their workforces, employee development has become an important differenti...
April 19, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
Identity Management Lays the Foundation...
When the pandemic drove millions of government employees out of their offices and into remote work two years ago, the need to overhaul legacy identity and access management (IAM) processes became apparent. President Biden’s Executive Order and National Security Memorandum on cybersecurity pushed this further by embedding Zero Trust architecture at their core, and January’s memorandum from the Office of Management and Budget (M-22-0...
April 19, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
What is the Tactical Edge - and Other U...
Everyone has seen media reports that Russian soldiers are using personal cellphones, rather than encrypted communications, because they made the mistake of destroying 4G and 5G towers. In military terms, they find themselves operating in a “denied environment,” because they accidentally rendered their comms network inoperable.All soldiers in a combat situation are operating at the “tactical edge,” where things like limi...
April 18, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Action Steps to Zero Trust in Government
Ever since the White House issued its Cybersecurity Executive Order in May 2021, a lot of attention has been paid to the concept of zero trust embedded as its core objective. But the reason to get to zero trust is to protect the data – after all, what do system intruders want? To read, or alter, or copy the data, which they can then use for their own purposes, from monetizing intellectual property to stealing someone’s identity to...
April 14, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Powering and Securing Federal Agencies Online
Safeguarding customer access yields better service Federal agencies have faced unprecedented demands over the past few years, as the pandemic shut down physical offices, forcing employees to work from home and requiring agencies to completely rethink how to provide services. Data breaches and accelerating ransomware attacks have harmed agencies’ operations just as they became dependent on online delivery of services. Now agencies are bei...
April 13, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Protecting Healthcare's Essential Data...
Last year, the U.S. healthcare system faced unimaginable demands created by the pandemic. Unfortunately, 2021 also was a banner year for healthcare data breaches – more than 40 million individuals’ health records were exposed. Nor are the cyber threats limited to personal records. Ransomware attacks locked down and encrypted hospitals’ and health departments’ data, and the Food and Drug Administration issued a Class I r...
April 12, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How to Improve the Government Customer'...
Words like “bureaucracy” and “red tape” often come to mind when folks think about government, but the quality of customer service is changing – for the better. In December 2021, the White House issued its "Executive Order on Transforming Federal Customer Experience and Service Delivery to Rebuild Trust in Government." In conjunction with the President's Management Agenda addressing customer experience, agencies ha...
April 11, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Building the Data Science Center of Exc...
The April 2022 Enterprise Data & AI featured guest speaker is Venkat Gunnu, Senior Director, Data Science & Innovation at Comcast and his presentation ‘Building the Data Science Center of Excellence at Comcast’ Thursday, April 7, 2022 from 11:30 AM - 1 PM ET! Data science is transforming business and generating new value across the organization. Data science still often requires dedicated technology and sophisticated teams...
April 7, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
ATARC Law Enforcement Summit: Securing...
Federal agencies have been mandated to adopt a zero-trust architecture, Federal leaders must develop a plan to implement a zero-trust architecture, incorporating as appropriate the migration steps that the National Institute of Standards and Technology has laid out. Agency heads need to describe the steps already completed to move to zero trust, identify activities that will have the most immediate security impact and include a schedule to imp...
April 5, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Getting to Compliance with the National...
On January 19, 2022, the White House issued National Security Memorandum 8 (NSM) to improve the cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. The memorandum requires National Security Systems to employ network cybersecurity measures equal to or greater than those required of federal civilian networks in Executive Order 14028, issued in May 2021. The NSM builds on several parts of the EO, includi...
April 5, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search