Back to Search Begin New Search Save Search Auto-Notify
ICIT 2021 Fall Briefing--Crossing the D...
The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancing the conversation about...
November 16, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
Unlocking Equity and Patient Experience...
Government healthcare leaders know that patient experience and workforce engagement are intertwined, but often teams lack the time and resources to analyze this data in real time and understand the connection. Additionally, the pandemic has exposed lingering inequities in the way healthcare, and other social services are delivered at the federal, state, and local levels. Leaders agree that improving patient experience and enhancing employee en...
November 16, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
A Government Guide to Zero Trust | Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Executive Order includes directives to CISA and GSA to develop a cloud security strategy and provide guidance to agencies for implementation.Address...
November 10, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cyxtera Federal Open House
This exclusive Open House Event is for existing and future Federal customers, as well as partners. Tour our cloud-smart, enterprise-grade facility and learn more about our FedRAMP-ready Cyxtera Platform for Government. Learn how we’re enabling agencies to adhere to cloud-smart mandates while optimizing their IT spend with our custom on-demand infrastructure and interconnection solutions. Network with your peers over beers and BBQ and mee...
November 9, 2021
Organizer: Cyxtera Technologies
Location: Sterling, VA
Add Favorite
A Government's Guide to Zero Trust Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Cybersecurity and Infrastructure Security Agency views this as setting an example for state and local governments looking to strengthen their securi...
November 9, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust Action Plan: Progress and Be...
The animating concept at the heart of the Cybersecurity Executive Order issued in May is Zero Trust – to structure cybersecurity around the premise that every person, every device, whether inside or outside its’ systems, is not to be trusted and must be verified before being granted access. Setting this as core to modernization is reflected in the awards just made by the Technology Modernization Fund. Three of the six public awards...
November 3, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cognitive Project Management for AI (CP...
Want to learn how to successfully run AI projects at any scale? Learn the latest best-practices methodology for AI, ML, and data analytics projects with Cognilytica’s Cognitive Project Management for AI (CPMAI) Methodology. Cognilytica’s CPMAI AI & ML Project Management Training & Certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects. The CPMAI method...
November 1-3, 2021
Organizer: Cognilytica
Location: Webcast
Add Favorite
Protecting Against Ransomware in Federa...
Advances in security technology have diverted cybercriminals from targeting individuals to a more lucrative approach; holding an organization’s entire operations hostage until a ransom is paid. The data that underlies government mission operations is the lifeblood and when it stops flowing, operations come to a halt. With government agencies ranked as the 4th most likely sector to be hit by ransomware, it’s imperative that business...
October 28, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Building low-code, high-impact business...
In our fourth webinar, we’ll discuss the Appian low-code development platform and how it enables acceleration of the creation of high-impact business applications. Join leaders from Deloitte and Appian to discuss real life examples on how the Appian platform orchestrates actions across users, robots, and systems into automated flows empowering organizations to work faster, smarter, better, and focus on what matters most.
October 28, 2021
Organizer: Scoop News Group
Location: Webcast
Add Favorite
How Intelligent Automation Is Helping H...
In the iconic “Star Trek” – whether the TV series of the 1960s or the two-movie adaptations over the past 40 (!) years – Dr. McCoy uses a handheld scanner to examine, diagnose, and treat his patients. What “Star Trek” doesn’t show is the vast amount of machine learning (ML) and artificial intelligence (AI) that culminated in the creation of the scanner’s capabilities. Though this level of compute...
October 28, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search