Back to Search Begin New Search Save Search Auto-Notify
Risk Management: A Group Effort
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it i...
March 9, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Accerelate Insights with Real-Time Data...
Over 83% of Federal Agencies are using real-time data streaming; by 2025, 90% of the global 1000 will leverage data streaming technologies, highlighting the explosive need for processing streaming data. Government agencies seeking to process data in real time have the difficult task of migrating masses of data with an added level of security to protect or safeguard mission-critical data. Agencies also operate under heavy regulatory and compli...
March 7, 2023
Organizer: HPE Government Team at Carahsoft
Location: Webcast
Add Favorite
DevOps Hurdles in 2023 and How to Overc...
DevOps plays a crucial role in an organization’s IT landscape. Even though it’s 2023, there are still hurdles that agencies need to overcome in order to implement the best practices for their DevOps environments. One challenge could be the initial cost of a platform, especially in comparison to legacy platforms that have already been deployed. Another issue is the turnover rates for DevOps professionals. Some candidates are more li...
March 2, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Fraudulent Behavior and How ICAM Can Assist
The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities. With scams, identity theft, and impersonators at an all-time high, the Federal Government has developed policies and training to prevent attacks. As a result, risk management strategies and internal control systems are implemented, monitored, and modified as necessary by management and governing bodies. A successf...
February 23, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Is Your Old Tech Slowing You Down?
Let’s set the stage: A recent government hire is given a laptop from 2016, another is asked to manage a call center that hadn’t been updated in more than a decade, a third is onboarded using an HR system that required them to travel across the country for onboarding because the paperwork wasn’t digitized. Do these issues sound familiar? In many cases, the government is operating on seriously outdated technology, and with supp...
February 9, 2023
Organizer: GovLoop
Location: Webcast
Add Favorite
Stop Zero-Day Malware with Zero Stress
Cyberthreats continue to increase in volume and complexity, with threat actors developing new ways to avoid detection – including highly evasive malware. To help organizations outpace these evolving threats, Palo Alto Networks announces PAN-OS® 11.0 Nova, the latest version of its industry-leading PAN-OS software, unleashing 50+ product updates and innovations.Nova is a leap forward in network security. It stops 26% more zero-day mal...
January 31, 2023
Organizer: Palo Alto Networks
Location: Webcast
Add Favorite
Tactics for Web App Security Using Zero...
Zero trust architecture at its core increases cyber defenses and reduces threats to data exposure, which is more critical than ever as web applications remain a top attack vector for gaining access to sensitive systems and information; attacks on web apps increased from 31.5% in 2020 to 53.6% in 2021, according to Kapersky. Fortunately, new guidance from the Department of Defense (DoD) presents seven pillars that are critical to ZTA success ...
January 26, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
States: Make Plans for Federal Cybersec...
As part of the Infrastructure Investment and Jobs Act of 2021, Congress included $1 billion over the next four years for state, local and tribal governments to strengthen their cybersecurity. The Cybersecurity and Infrastructure Security Agency established the State and Local Cybersecurity Grant Program and the Tribal Cybersecurity Grant Program to distribute funds. The Federal Emergency Management Agency is responsible for administration and...
January 10, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
New Year, New Goal: Setting Your 2023 T...
The annual ritual of setting performance goals for your employees can go one of two ways: It can be a check-the-box exercise that is endured and then forgotten, or it can be an opportunity to help employees understand how their personal goals intersect with the larger goals of their team and the organization. Join us online Monday, Dec. 19 at 4 p.m. ET/1 p.m. PT to hear from a government expert on how to make goal-setting a meaningful, collabo...
December 19, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Enhance and Extend: Zero Trust Principl...
Approaching the one-year anniversary of the Office of Management and Budget’s memorandum on “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles,” this session will reflect on how agencies are meeting the specific criteria while utilizing ZT architecture. OMB’s memorandum involves centralizing identity management to provide enterprise identity and access management services to reduce the burden on agen...
December 8, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search