Back to Search Begin New Search Save Search Auto-Notify
Responsible AI & Speed to Mission: How...
With rapidly changing priorities, new threats, and an increasingly high expectation from citizens for digital services, government agencies must discover new ways to streamline their delivery of digital applications and systems. On top of that, they need to ensure that data and AI are being used responsibly. Responsible AI ensures that end-to-end model management addresses the specific risks of AI (i.e., discriminatory biases and lack of trans...
September 15, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Supporting the Success of Workforce Inn...
Over 2 years into the COVID-19 public health emergency, the U.S. government continues to fund massive amounts of investment in pandemic relief. Recently the White House announced that $40 billion in American Rescue Plan investments have been committed to workforce development. This amount includes over $13B in workforce investments that have been committed or proposed by more than 1,000 State, Local, Tribal and Territorial governments.1 These...
September 15, 2022
Organizer: Equifax Government Team at Carahsoft
Location: Webcast
Add Favorite
Identity: The First Pillar of Zero Trust
Zero trust is vital for our nation's cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn't have to be. In this engaging session, you'll learn: Why Identity is Pillar #1 How Identit...
September 13, 2022
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
When All Fails: How To Be Cyber Resilient
There is a focus on ensuring an agency’s cybersecurity is as up to date as possible. But, what does one do when all systems put in place to assist in threat attacks break down? Given the high stakes in today’s cyber threat landscape, a good cyber strategy must be based on the assumption that, sooner or later, the agency’s defenses will fail. This assumption places the agency’s one step ahead of the attack: knowing that...
September 8, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Industry Profile: Building a Risk Manag...
Changes to the Cybersecurity Maturity Model Certification (CMMC), increased threats and risk to organizational data, third party vendor risk and increased numbers of compliance and framework requirements, makes it challenging to know where to start. Join this webinar to hear directly from one of your peers, Eric Matthews, Senior Strategic Advisor) from Alutiiq, about how he was able to effectively adopt and deploy the Cyturus Cyber Risk Tracke...
September 8, 2022
Organizer: Cyturus Technologies Government Team at Carahsoft
Location: Webcast
Add Favorite
Upskilling The Federal Workforce to Mee...
Technology is arguably at the center of every agency today. Introducing new technologies is important but in order for an agency to use them effectively, the workforce must evolve with the tech. Closing the gap between technology skills that are needed for mission success and those that are available is one of the most important challenges government agencies face. There doesn’t seem to be a week that goes by without a new publication on...
September 1, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
How AI is Making Self-Service a Reality...
AI in Government is excited to host Rushali Patil, Engagement Manager at Quantiphi and her presentation ‘How AI is Making Self-Service a Reality in the Public Sector’ on Tuesday, August 30, 2022 at 12PM ET! Many service-oriented government agencies have faced increasing pressure in recent years to keep up with many demands from an ever-changing environment. To meet these unprecedented inquiries, update guidelines frequently and acc...
August 30, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
The Quantum Security Challenge
Quantum computing is advancing rapidly, and its impact is likely to be large—their potential computational power that could render today’s encryption algorithms obsolete. To address this looming threat, the White House issued a National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM 10) this May. The NSM 10 fact sheet states that ...
August 25, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Mark43 Webinar: The Power of Data
As agencies look to strengthen their partnerships with the communities they serve, efficient collection and reporting use of force event data has never been more critical. In addition to helping agencies meet their communities in the moment, agencies can also draw actionable insights from use of force data to identify future training opportunities, assess whether the deployment of force is working as intended, and much more.Join Mark43 for an...
August 23, 2022
Organizer: Mark43 Government Team at Carahsoft
Location: Webcast
Add Favorite
Using IOT and AI to Transform Operation...
If your agency’s day-to-day operations are critically dependent on assets – such as processing equipment, facilities equipment, and infrastructure at large repair sites – maximizing uptime is a constant challenge. Without timely maintenance, equipment failure can be catastrophic, directly impacting operations and reducing mission readiness. The traditional approach of scheduled manual periodic checks and asset condition repor...
August 18, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search