DoD Investing in the Future of 5G
Communications security is one of the foremost priorities in any battlespace. This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly. Its ability to handle massive amounts of data makes it a crucial component in real-time data collection from all sources,...
October 20, 2023
Organizer:
FedInsider Location:
Webcast
5G: The Transformation of Defense Networks
In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD...
October 13, 2023
Organizer:
FedInsider Location:
Webcast
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer:
FedInsider Location:
Webcast
The Truth About Phishing in Gov
We’ve all clicked on an email or two that we shouldn’t have. The new Federal Zero Trust Strategy (OMB M-22-09) aims at addressing that, by requiring agencies to implement “phishing-resistant” multi-factor authentication (MFA) for employees, partners, and contractors. But what is phishing-resistant MFA? Join us online Thursday, June 8 from 2-2:30 p.m. ET/11-11:30 a.m. PT, to hear industry experts share how phishing-resis...
June 8, 2023
Organizer:
GovLoop Location:
Webcast
i2 User and Training Conference
Join us for the ultimate i2 experience at the upcoming User and Training Conference in Alexandria this May! As the world's largest gathering of i2 professionals, it promises to be a stimulating opportunity for you to discover the latest innovations in i2, refine your tradecraft skills, and elevate your knowledge with our cutting-edge training sessions. This two-day conference is a must-attend event for anyone looking to stay ahead of the curve...
May 23, 2023
Organizer:
i2 Location:
Alexandria, VA
Remove Cloud Complexity for Mission-Cri...
CANCELED
If you need to access agency applications easily and securely, the cloud is your solution. But managing a multitude of clouds, and performance, access, and security of each, you’re looking at a complex cloud environment. Join us online Thursday, May 18, at 2 p.m. ET/11 a.m. PT as we speak with experts about how you can create a cloud environment that truly enables your workforce, allowing them to be productive and efficient while being secure.
May 18, 2023
Organizer:
GovLoop Location:
Webcast
Don't Fall Victim to Cyber Threats: Imp...
Forty-three percent of government employees who work from home admit to making a mistake that had security repercussions and 47% say they’ve clicked on a phishing email at work. As the government workforce becomes more dispersed, government is increasingly exposed to new attackers and vulnerabilities. Join us online Thursday, April 13, at 2 p.m. ET/11 a.m. PT to hear about updates to the threat landscape and what your organization can do...
April 13, 2023
Organizer:
GovLoop Location:
Webcast
CMMC: The Most Important Certification...
CMMC: The Most Important Certification In Contract History The Department of Defense created the CMMC program to enforce cyber hygiene standards across the Defense Industrial Base supply chain. CMMC (Cybersecurity Maturity Management Certification) is a set of standards, frameworks and practices that are implemented in levels of maturity to ensure the safety of FCI (Federal Contract Information) and CUI (Covered Unclassified Information). This...
4 Steps to Building a Strong Identity-C...
Building a foundation for modern security that can meet current and future requirements must remain a top priority for federal agencies. But as agencies pursue both IT modernization and zero-trust security, it’s easy to get lost in the complexities and lose focus. As always, the underlying enabler is identity security. Join us online Tuesday, Dec. 13, at 2 p.m. ET/11 a.m. PT when government and industry leaders will help us cut through t...
December 13, 2022
Organizer:
GovLoop Location:
Webcast
AWR-213 - Critical Infrastructure Secur...
AWR-213 – Critical Infrastructure Security and Resilience Awareness This course will introduce participants to the key terms, policy, guidance, and preparedness efforts required to safeguard the Nation’s critical infrastructure. Participants will discuss the risk management framework, describe Federal critical infrastructure security and resilience and information sharing programs, and relate critical infrastructure programs to ind...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.