Risk Management: A Group Effort
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it i...
March 9, 2023
Organizer:
ATARC Location:
Webcast
Love, Lies & Billions Lost: Eliminating...
Every year, federal agencies dispense hundreds of billions of dollars in grants, loans, disaster relief, tax refunds, disability payments, insurance claims, pensions, and more. But the financial fraud, waste, and misuse of these program funds have resulted in billions lost along with diminishing citizen trust. To avoid the loss of "citizen love," agencies must stay ahead of fraudsters with a scalable, connected, and real-time technology that s...
Deception Strategy in Zero Trust Environments
A zero trust architecture (ZTA) is an enterprise cybersecurity architecture that is based on zero trust principles and designed to prevent data breaches and limit internal lateral movement. In a zero trust environment, identity stores are a primary attack surface where any compromise of identity can create significant risk. Endpoints and any credentials they contain are also a persistent source of risk; when an adversary escalates privileges a...
PWS, SOO, SOW - Finding the Best Fit
Do you know the difference between a Statement of Work (SOW), a Performance Work Statement (PWS) and a Statement of Objectives (SOO)? How do you decide which to use, especially as it relates to professional services acquisitions? Join our experts to learn about the pros and cons of each, along with some examples and lessons learned from using each option. Earn 1 CLP! A SOW is typically used when the task is well-known and can be described in s...
The Future of FedRAMP: Reach Your Secur...
The FedRAMP Authorization Act becoming law is a promising development for government agencies prioritizing security to reimagine old processes, workflows, and experiences. FedRAMP’s codification provides government agencies with easier access to advanced security solutions that enable agility and flexibility to meet their modernization goals. Join our complimentary webinar to learn more about the FedRAMP Moderate authorization and see ho...
GSA 101 Who We Are and What We Do
Who is GSA? Come learn what GSA offers! We will provide overview of GSA's Federal Acquisition Service, Customer Accounts & Stakeholder's Engagement (CASE) and the role of your Customer Service Director. Also, we will share brief description of GSA offerings which include useful acquisition vehicles, market research and training information. Please come join us Thursday March 9, 2023 for this free, 1 CLP course, with time set aside for Q&A.
Implement the New NIST RMF Standards an...
What are the impacts on the new Federal Information Security Management Act (FISMA) reporting resulting from the new documents released in 2022? Some of the key documents are: Presidential Executive Order 14028 that has increased emphasis on advancing toward “Zero-Trust Architecture” and “Endpoint Detection and Response (EDR)” and moving systems to FedRAMP clouds. Office of Management and Budget’s (OMB’s) M-...
Emerging Technology and Modernization Summit
New, exciting and transformative technologies have the potential to reshape how the government fulfills its mission. Emerging technologies have been born both out of long-standing challenges to government operations and in reaction to shifting priorities and citizen demand. Continuing cloud migration and management, more potent cybersecurity and supply chain risks, budgeting, as well as evolving remote work environments, all play a part in inc...
Accelerate Your Datacenter Evacuation w...
Be a hybrid cloud hero. With VMware Cloud (VMC) on AWS, the only FedRAMP and Department of Defense (DOD) Impact Level 5 (IL5) authorized VMware Cloud solution, you can drastically accelerate your datacenter evacuation mandate. VMC on AWS can help your agency move workloads to the cloud faster, and at a lower cost, while delivering modernized applications and infrastructure services with familiar tools and newfound scale. Join VMware, AWS, and...
Unlock the Potential of Commercial Inno...
While the U.S. federal government is developing and adopting new technologies at an unprecedented pace, it’s still challenging to capitalize on emerging technologies from the commercial sector without loosening critical security and compliance controls. How can the intelligence community embrace commercial innovation while protecting classified data? And how can our national security agencies work effectively with commercial technology i...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.