Back to Search Begin New Search Save Search Auto-Notify
Cyber Resilience for the Defense ...
Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. By understanding the data—its location, accessibility, and how to res...
January 22, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Resilient and Camouflaged Communication...
In high-stakes environments, secure and reliable communication can mean the difference between mission success and failure. Join Dominic Perez, CTO of Curtiss-Wright Defense Solutions and Timothy Hillner, CTO of Fairwinds Technologies, as they delve into advanced strategies for ensuring resilient communications for forward deployed teams. This webinar will explore innovative approaches to safeguard data and maintain connectivity, even in hosti...
January 22, 2025
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Data Modeling for State & Local Governments
If a picture is worth a thousand words, turning data into graphical images that show relationships must be just as valuable. Agencies across the country, looking for ways to better leverage the value of the data they already gather, are wrestling with how to implement data modeling to make use of the information. There are four key areas where data modeling tools provide value: Data governance and compliance is easier when a data modeling tool...
January 23, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Revolutionizing Federal IT: The Power o...
Federal leaders feel immense pressure to modernize legacy applications to improve user experiences and accelerate mission outcomes. As Americans’ expectations of government services continues to grow, harnessing generative AI (GenAI) provides leaders with opportunities to improve delivery through streamlined software development, enhanced workforce efficiency, and strategic decision-making. Harnessing AI is a useful way to advance modern...
January 29, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
February 3-7, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Prodacity
Purpose and Vision: Prodacity is a beacon for govtech leaders at every level committed to the continuous delivery of valuable software users love into challenging production environments, emphasizing tested playbooks, real-world solutions, and a relentless commitment to the bold action inside cautious, slow-moving organizations. Content and Learning: Our meticulously curated agenda around people, processes, and technology is dedicated to prope...
February 4-6, 2025
Organizer: Rise8
Location: Nashville, TN
Add Favorite
CyberSmart 2025: From A to Z
Federal agencies understand that cybersecurity has to be the foundation of their operations, from online to back office. For instance, the telecommunications breach by Salt Typhoon, a Chinese government-backed hacking group, targeted both U.S. political leaders and national security information. First detected in early summer, in December the Cybersecurity and Infrastructure Security Agency (CISA) said at a press conference there is no way to...
February 6, 2025
Organizer: FedInsider
Location: Reston, VA
Add Favorite
CMMC 2.0: What DoD Contractors Need to Know
2025 promises to be a very busy year for the Department of Defense (DoD) and its contractors. In October 2024 the department issued a new rule implementing the Cybersecurity Maturity Model Certification (CMMC) 2.0 program, requiring contractors to implement required security measures to protect federal contract information (FCI) and controlled unclassified information (CUI). The rule rolls out the requirements in four phases over the course of...
February 6, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Pathways to Zero Trust: How Governments...
As cyber threats evolve, our government is adopting Zero Trust frameworks to protect critical infrastructure, sensitive data, and citizen services. This webinar explores the strategies, technologies, and policies shaping the transition to Zero Trust in 2025. Our expert panel will discuss the latest advancements in identity management, data segmentation, and real-time threat detection. Attendees will gain insights into compliance requirements,...
February 6, 2025
Organizer: ATARC
Location: Webcast
Add Favorite
Nexus 2025
February 9-12, 2025, NCMA's Nexus will be at the Long Beach Convention Center in Long Beach, CA to convene the entire acquisition team to support our mission to advance contract management’s nexus with related acquisition communities. This event will dive deep into executing beyond OFPP Myth-Busting, forging future buyer-seller relationships, and conducting meaningful market research that leads to real solutions. It’s all abo...
February 9-12, 2025
Organizer: NCMA
Location: Long Beach, CA
Add Favorite
Back to Search Begin New Search