603 past events found
+ 14 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Breakfast & Bots - Sacramento
Join us for Breakfast & Bots, a thought-provoking, insightful RPA workshop that will help you understand why government offices across America are using Intelligent Automation, and build your first bot before you leave. At Breakfasts & Bots – an RPA workshop roadshow across different cities in the US – you can learn with our experts on the state of automation adoption in the government. We will share best practices, proven...
April 18-20, 2022
Organizer: Roboyo
Location: Sacramento, CA
Add Favorite
Federal Mobility Group And ATARC 5G Gov...
The Federal Mobility Group (FMG), in partnership with ATARC, is holding the fourth annual 5G Government Symposium to drive greater awareness of fifth generation (5G) technologies, highlight innovative use cases and showcase current deployments. This event will demonstrate the dynamic opportunities surrounding 5G and the challenges in realizing them. Attendees will learn more about 5G-related applications helping government and industry meet th...
April 19, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
ICIT Virtual Briefing I Secure Automati...
Digital workers amplify human potential, and digital and human workers working in collaboration amplify your organization’s potential. While there is some discomfort with digital workers, digital workers are improving human worker’s wellbeing by taking over tasks allowing for re-skilling employees. A recent study indicates that work-life balance is a key driver for SOC analyst burnout. Implementing digital workers may help alleviat...
April 19, 2022
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
AI in Government - What It Really Takes...
AI in Government is hosting guest speaker Kevin Mills, Head Global Government Partnerships at Coursera presenting ‘What it Really Takes to Get AI Skills: Making AI and Data Knowledge a Reality in Government’ on Tuesday, April 19, 2022 from 12 PM - 1 PM ET! As organizations in both the public and private sectors are grappling with the digital skills gap within their workforces, employee development has become an important differenti...
April 19, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
Identity Management Lays the Foundation...
When the pandemic drove millions of government employees out of their offices and into remote work two years ago, the need to overhaul legacy identity and access management (IAM) processes became apparent. President Biden’s Executive Order and National Security Memorandum on cybersecurity pushed this further by embedding Zero Trust architecture at their core, and January’s memorandum from the Office of Management and Budget (M-22-0...
April 19, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
What is the Tactical Edge - and Other U...
Everyone has seen media reports that Russian soldiers are using personal cellphones, rather than encrypted communications, because they made the mistake of destroying 4G and 5G towers. In military terms, they find themselves operating in a “denied environment,” because they accidentally rendered their comms network inoperable.All soldiers in a combat situation are operating at the “tactical edge,” where things like limi...
April 18, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
EC-Council Ethical Hacker Training - Wa...
The Certified Ethical Hacker certification is one of the most sought-after cybersecurity certifications around the globe. Organizations like the DoD and ANSI have endorsed and/or accredited the CEH course. Want to Master CEH? This program incorporates instruction and practice to get students ready to take the CEH certification exam as well as the CEH Practical Exam. Candidates who successfully pass both exams earn the CEH Master credential as...
April 11-15, 2022
Organizer: EC-Council
Location: Washington DC, DC
Add Favorite
Action Steps to Zero Trust in Government
Ever since the White House issued its Cybersecurity Executive Order in May 2021, a lot of attention has been paid to the concept of zero trust embedded as its core objective. But the reason to get to zero trust is to protect the data – after all, what do system intruders want? To read, or alter, or copy the data, which they can then use for their own purposes, from monetizing intellectual property to stealing someone’s identity to...
April 14, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Powering and Securing Federal Agencies Online
Safeguarding customer access yields better service Federal agencies have faced unprecedented demands over the past few years, as the pandemic shut down physical offices, forcing employees to work from home and requiring agencies to completely rethink how to provide services. Data breaches and accelerating ransomware attacks have harmed agencies’ operations just as they became dependent on online delivery of services. Now agencies are bei...
April 13, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Protecting Healthcare's Essential Data...
Last year, the U.S. healthcare system faced unimaginable demands created by the pandemic. Unfortunately, 2021 also was a banner year for healthcare data breaches – more than 40 million individuals’ health records were exposed. Nor are the cyber threats limited to personal records. Ransomware attacks locked down and encrypted hospitals’ and health departments’ data, and the Food and Drug Administration issued a Class I r...
April 12, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search