Back to Search Begin New Search Save Search Auto-Notify
ICIT 2021 Fall Briefing-- Crossing the...
ICIT 2021 Fall Briefing The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancin...
November 30, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
ATARC Digital Services Virtual Summit
Digital Services Centers aim to help agencies modernize their IT portfolios in a more disciplined, well-managed, and controlled manner. Listen to topic experts discuss how a “lean factory” approach can accelerate product development to meet mission requirements. In today’s digital age, as our workforce is transforming into a hybrid environment, many Federal Agencies are experiencing problems and challenges. Hear as topics exp...
November 30, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Using Digital Transformation to Improve...
There are so many changes rippling through the healthcare sector, it is easy to forget that the point of introducing innovative new technologies is to provide better outcomes for patients. Digital transformation can enable healthcare providers and researchers to make better-informed decisions on everything from what factors contribute to cancer to treating and preventing the spread of emerging novel diseases such as COVID-19. Programs such as...
November 18, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Developing and Executing a Data Governa...
Tune in to hear topic experts give their insights on the best practices for developing a data governance strategy in today’s hybrid world. How is this shaping decision making and policies? What pitfalls, if any, will agencies want to avoid as they look to evolve their policies and processes in relation to data security? Our panel of experts will discuss the best ways to execute a successful data governance strategy that allows agencies t...
November 16, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Data for AI: Lessons Learned from AI Pr...
Far too often, agencies, organizations, and consulting firms are running data and AI projects without taking the right steps to ensure their success. Agile and iterative approaches have become adopted best practices for application development projects, but why don’t we have something similar when it comes to advanced analytics, big data, and AI projects? Without using best-practices approaches that standardize steps for data preparation...
November 16, 2021
Organizer: Cognilytica
Location: Webcast
Add Favorite
ICIT 2021 Fall Briefing--Crossing the D...
The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancing the conversation about...
November 16, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
Unlocking Equity and Patient Experience...
Government healthcare leaders know that patient experience and workforce engagement are intertwined, but often teams lack the time and resources to analyze this data in real time and understand the connection. Additionally, the pandemic has exposed lingering inequities in the way healthcare, and other social services are delivered at the federal, state, and local levels. Leaders agree that improving patient experience and enhancing employee en...
November 16, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
A Government Guide to Zero Trust | Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Executive Order includes directives to CISA and GSA to develop a cloud security strategy and provide guidance to agencies for implementation.Address...
November 10, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
A Government's Guide to Zero Trust Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Cybersecurity and Infrastructure Security Agency views this as setting an example for state and local governments looking to strengthen their securi...
November 9, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust Action Plan: Progress and Be...
The animating concept at the heart of the Cybersecurity Executive Order issued in May is Zero Trust – to structure cybersecurity around the premise that every person, every device, whether inside or outside its’ systems, is not to be trusted and must be verified before being granted access. Setting this as core to modernization is reflected in the awards just made by the Technology Modernization Fund. Three of the six public awards...
November 3, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search