Secure Automation for Mission Readiness...
Briefing Summary: Federal agencies have increased focus on Intelligent Automation (IA) and Robotic Processing Automation (RPA) as part of their modernization journey. Many have achieved impactful results from automating countless manual processes, freeing up time to focus on innovation and mission support. Although mission critical, the acceleration of automation can introduce new security risks and expand the attack landscape. Agencies lookin...
FCW Summit: FedRAMP
The Federal Risk and Authorization Management Program (FedRAMP), the government-wide plan to secure cloud products and services, is almost a decade old. It is still evolving, however. Early in 2021, the House of Representative passed a bill that would have codified a number of its provisions into law, standardizing its processes for agencies to on-ramp cloud computing technologies. To date, the Senate has not acted on the bill. At the same tim...
FCW Workshop: Digital Transformation
Digital transformation is a holistic re-imagining of how companies, governments and organizations use technology, people and processes to deliver services or perform their mission. Through digital transformation, federal agencies look to deliver the same kinds of business or customer-focused digital experiences that are common in the commercial arena. The federal sector has been pursuing digital transformation for years through various avenues...
FCW Workshop: Cybersecurity
For federal, state and local government cybersecurity executives, the mission to detect and eliminate hackers on their expanding digital networks has always been a fluid exercise. In the last year, their work has become even more challenging. As the pandemic pushed agencies to remote work, they leaned even more on cloud computing, mobile and remote access capabilities, and the attack surface has become more diffuse and vulnerable. Sly, determi...
CyberTalks 2021
CyberTalks is back. The largest annual gathering of CISOs and cyber leaders from the government, technology industry, finance and the medical sector is will get underway on Tuesday, June 15 and continue to Wednesday, June 16. During these unprecedented times, the necessity to come together is more urgent than ever. CyberTalks will virtually showcase influential decision-makers for daily lightning talks, keynotes and fireside chats that explore...
Protecting BYO Mobile Devices within Ze...
ATARC Presents in Partnership with Zimperium An open discussion with experts from the National Institute of Standards and Technology (NIST), the MITRE Corporation, and U.S. Department of Defense. The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National...
Age of Identity - A Public Sector Forum 2021
Constituents have grown to expect convenient and reliable online services and public sector organizations are increasingly looking to the cloud to find ways to strengthen security while improving digital services. But to do so properly — creating a trustworthy, user-friendly and frictionless experience for the end customer — these services must have identity management and cybersecurity ingrained into their DNA. Join top leaders an...
June 3, 2021
Organizer:
CyberScoop Location:
Virtual
Implement the New NIST RMF Standards an...
OVERVIEW By the beginning of 2021, NIST will have released the finals of many Risk Management Framework (RMF) standards: SP800-53 Rev 5 – Security Controls SP800-53B – Security Control Baselines, Privacy Framework SP800-160 Vol 2 – Systems Security Engineering SP800-161 Rev 1 – Supply Chain Risk Management SP800-171 Rev 2 – Controlled Unclassified Information (CUI) and High Valued Assets (HVA) Revisions to the NIS...
The Newest Attack Vectors - Infrastruct...
The Newest Attack Vectors - Infrastructure as Code & API Security Moving applications and development to the cloud has delivered both operational and security benefits at scale. However, as organizations begin to automate their infrastructure deployments and configurations using Infrastructure as Code (IaC), a new attack vector has been introduced. In addition, the move to cloud-native architectures increases the use of APIs connecting cli...
FCW Workshop: Moving CMMC Forward
As DOD continues the roll-out of its Cybersecurity Maturity Model Certification program, both government acquisition professionals and the contracting community are scrambling to understand and implement the certification requirements. Join us to learn the latest on what is required and what may be ahead for acquisition and contracting executives concerning cyber certifications and audits as government and industry experts share their insights...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.