Back to Search Begin New Search Save Search Auto-Notify
Protecting the Expanding Cyber Attack Surface
One of the major challenges for IT administrators and staff during the recent pandemic was the explosion of the network as working from home became the norm. Agencies that didn’t already have a good handle on the number of devices connected to their networks or how those devices were configured found themselves overwhelmed by the vast expansion of their vulnerable attack surface. Since that time, the attack surface has continued to expan...
March 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Modernizing IT Without Rip-and-Replace
The push for digital modernization by government at all levels has been under way for several years now. State and local governments had to scramble during the pandemic to find ways to support employees working remotely, adding momentum to the modernization push. Despite the need, IT budgets haven’t kept up – from staffing issues to costly legacy infrastructure, state and local agencies are struggling to find ways to maximize the v...
March 21, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Addressing the Human Side of the Zero T...
As agencies pursue their zero trust goals in line with Executive Order 14028, “Improving the Nation’s Cybersecurity,” and the Office of Management and Budget’s memorandum setting a Federal Zero Trust Strategy, it is easy to focus on technology solutions. But that overlooks something fundamental about both the challenge and the purpose of moving to zero trust – the human beings that actually will use the redesigned...
March 8, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Bringing a Product Management Mindset t...
Delivering excellent, equitable, and secure federal services for an outstanding customer experience is a priority that comes from the President’s Management Agenda. Achieving that goal can be helped by learning from a different mindset found mostly in the private sector – product management. Excellent experiences don’t just happen—they need to be designed in a deliberate manner. In a traditional software build, long per...
March 7, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Integrating Satellites and Military Missions
The Holy Grail of military operations over the centuries has been the ability to coordinate and command all the resources available for the mission. For millennia, it was how to coordinate land and sea operations. The 20th century saw the addition of air forces, and now it includes utilizing resources in space – true multi-domain operations. The Department of Defense’s Joint All-Domain Command and Control (JADC2) concept is a big p...
February 28, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Streamlining HR from Hire to Retire wit...
Government agencies at all levels, from the smallest town to the biggest federal offices, are struggling with filling job vacancies and retaining workers, especially for in-demand skills such as cybersecurity and IT management. For the U.S. government, strategic human capital management has been identified as a serious problem for more than 20 years. State and local agencies continue to feel the effects of both the pandemic and competition wit...
February 23, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Vision 2023: Transforming Florida Throu...
In today’s digital world, IT modernization and cybersecurity are intertwined with delivering a vast range of state services to residents. According to the National Association of State CIOs, these were the top two concerns facing state governments in 2022. They are two reasons why the state of Florida in 2020 created the Florida Digital Service (FDS), to partner with all state agencies to deliver services. In a state that often faces nat...
February 9, 2023
Organizer: FEDINSIDER
Location: Tallahassee, FL
Add Favorite
Cybersecurity Stays Front-of-Mind in 20...
Federal agencies have taken the lead in the public sector’s adoption of cloud computing. It has provided many benefits, including flexibility for applications, cost savings as legacy systems have been phased out, and empowering customers in their interactions with agencies – but it also has opened new methods for cyberattacks, such as corrupting elements of the software supply chain. As a result, data protection is more important t...
January 31, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Stays Front-of-Mind in 20...
The COVID-19 pandemic forced public sector agencies across the country to rely on their IT to deliver services to customers. The “forced evolution” of systems can be seen as a long-term benefit, but it also amplified the vulnerability of communities to potentially serious cyberattacks. For instance, the threat of ransomware continues to grow as cyber criminals target managed service providers, the cloud, and the software supply cha...
January 26, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Securing Your Networks From IPv6 Threats
Securing Your Networks From IPv6 Threats The explosion of Internet-connected devices – from mobile communications to the Internet of Things – demonstrates the need for the quantum increase in available IP addresses created by moving to IPv6. This webinar, the second of four sessions, addresses the unique strengths and security challenges of IPv6. The shift to IPv6 means that end-to-end encryption is built into devices and systems,...
January 25, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search