Data Driven Forum
DescriptionRobust, accurate, timely, structured, and relevant data that provides a unified view is a necessary requirement for sound business strategy. Agencies and industry alike need to know how to identify and match, correct, implement identity rules, enforce adoption of taxonomies and analytics and reference data while also establishing and communicating information policies and mechanisms to ensure effective data use with policies, rules,...
May 4, 2021
Organizer:
ACT-IAC Location:
Virtual
Zero Trust: Who’s In Your Network?
Zero Trust: Who’s in your network? In 2019, securely operating a distributed workforce was an ideal “wouldn’t it be great if,” and in 2020, this became a requirement. In the wake of the COVID-19 pandemic, cybersecurity teams found themselves frantically working to continue business operations in a suddenly perimeter-less environment. And that trend is likely here to stay, which means that cybersecurity and business lea...
Federal Insights Exchange Featuring GSA...
This session will provide an update on GSA’s multi-award, 10-year, $50B program, agencies’ EIS transition progress and successes, the importance of cyber, the FITARA scorecard, the transition close out, what’s ahead in 2021, and more. Learning Objectives: - Learn more about GSA’s EIS and the newly named OETS organization - Gain insights on EIS progress. key features, benefits, progress to date program’s key featur...
April 19, 2021
Organizer:
ACT-IAC Location:
Webcast
The Modern Security Battlefield: What 2...
ICIT Virtual Briefing | The Modern Security Battlefield While 2020 was fraught with tragic outcomes of social and economic proportions, security teams have learned many lessons on resilience and have orchestrated many technical innovations to secure a distributed workforce. An expanded attack surface, sophisticated breaches like the SolarWinds attack and a pressing need to improve operational efficiency, has reframed digital transformation pr...
Zero Trust: Beyond the Moat
As technology evolves, so do the threats to its security. The remote work shift caused by the continuing pandemic has pressed security teams to reassess how they verify and allow access. Zero Trust is a strategy, not a product, which reimagines the way access is granted to users, to data and to applications. Devices, which used to be central to identity, now include personal computers and home internet connections, which are not government iss...
SANS 2021 - Live Online
SANS is committed to delivering high-quality cyber security training so you can keep your skills sharp and stay ahead of cyber threats. Join us for interactive training during SANS 2021 - Live Online (March 22-27, EST), and receive relevant, applicable training from wherever you are. Choose from over 30 interactive courses, plus three NetWars Tournaments delivered Live Online. SANS Live Online events offer live-stream, instructor-led cyber sec...
Telework: The Office is Wherever I am
As the global pandemic continues and countries wait for a vaccine, estimates about when federal employees will return to their offices in force range from Summer 2021 to Never. Many organizations have discovered the advantages of telework and now plan on expanding its use, even when there is not a snowstorm or health crisis. Although some jobs require on-site personnel, the Office of Personnel Management said that 42% of federal employees are...
ATARC Integrated Cyber Strategies Virtu...
Strengthening the Federal information and communications infrastructure is essential to our national security and economic prosperity. Consequently, significant resources are being allocated to this effort. How then do agencies tackle the challenges they have long faced– legacy system interoperability, multi-vendor integration, and the rapid evolution of technologies and dynamic cybersecurity threats? In this session, learn how agencies...
March 23, 2021
Organizer:
ATARC Location:
Virtual
2021 ICIT Spring Briefing: ICT SUPPLY C...
The ongoing Russian APT attack underscores the importance of “securing our national supply chains," but what does that mean? What needs to be done, how can it be done and who needs to take action?The 2020 Cyberspace Solarium Commission (CSC) Report says “implement an information communications technology industrial base strategy to ensure more trusted supply chains and the availability of critical information communications...
Zero Trust Security: How Google Approac...
In this virtual fireside chat, Google Cloud Security Expert, Dan Prieto and Google Cloud Director of Government Security & Compliance, Jeanette Manfra will tackle some of the most top of mind security questions in the industry today. They’ll reflect on the recent cyber attacks, including Solar Winds, and what governments and private industries could do differently moving forward to address evolving risks. They’ll provide insigh...
March 18, 2021
Organizer:
ACT-IAC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.