72 past events found
+ 3 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Securing Access to Data: An Exploration...
In today’s interconnected and rapidly evolving digital landscape, ensuring secure access to sensitive resources is of paramount importance. There are various methods of securing data and Federal agencies have explored a majority of them. Identity, Credential, and Access Management (ICAM) and Attribute-Based Access Control (ABAC) have emerged as two prominent frameworks that enable organizations to address the challenges associated with a...
July 20, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting Critical Infrastructure with...
Modern cybersecurity measures such as post-quantum cryptography (PQC) and zero trust architecture (ZTA) are essential to protect U.S. critical infrastructure and ensure a resilient nation. And with a flurry of comprehensive initiatives coming from the Executive Branch, Pentagon, NSA, and NIST, it can be challenging for U.S. government CIOs and CISOs to determine where to prioritize resources. But PQC and ZTA aren’t mutually exclusive: ef...
June 22, 2023
Organizer: ATARC
Location: Virtual
Add Favorite
How The Government Can Stay Ahead of Sp...
In the digital age, government agencies face increasing threats from spyware that can compromise sensitive information and undermine national security. To combat this, many government organizations are taking proactive measures by implementing executive orders and directives to ban specific applications on their mobile devices. However, this approach presents challenges in terms of scalability, visibility, and keeping up with rapidly evolving...
June 15, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Streamlining Security Authorization Thr...
Federal agencies must undergo the complex and laborious process of security authorization to operate (ATO) for each information system (IS) in accordance with the Federal Information Security Modernization Act (FISMA). Currently, most agencies rely on manual documentation processes. These include popular productivity tools to capture the applicable security controls and the status/plans of implementation of the controls for each IS as well as...
June 1, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Cyber Resilience for Modern, Agile, and...
Today’s cybersecurity threat landscape means Federal professionals must take a proactive and practical approach to defending agency personnel, systems, networks, and data. IT infrastructures need resiliency that is built in, understood by the workforce, and prepared to work beyond the next threat. Creating a resilient IT architecture is not an admission of anticipated defeat. Rather, it’s insurance against probable events and incid...
May 25, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Accelerating Zero Trust with Complete I...
To advance Zero Trust mandates, federal IT leaders need an accurate, trusted, and complete picture of their entire IT estate. Attend this webinar to learn how your agency can better comply with OMB’s January 2022 memo, M-22-09, Moving the U.S. Government Toward Zero Trust Cybersecurity Principles. Attendees will hear how to develop a real-time situational awareness and understanding of everything on their networks, whether they are based...
May 18, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Navigating cATO Challenges in the Feder...
Join our thought leadership webinar to learn about the current operational challenges that federal agencies face on their journey to cATO and how to address them effectively. In this session, we’ll delve into the common challenges of proving compliance, vulnerability management and reporting, and assessing control effectiveness. We’ll provide real examples into best practices to address those challenges. Our panel of experts will p...
May 11, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Tackling the Challenge of Operational T...
Cybersecurity is usually framed in terms of IT – from malware to phishing to ransomware, federal agencies are paying attention to securing their networks and endpoints. But leaders often overlook security measures for operational technology (OT) and industrial control systems (ICS), such as building automation systems, physical access control systems, physical environment monitoring systems, and implementing a zero trust architecture. In...
April 18, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Think Like a Hacker: Tactics to Identif...
Earn 1.5 CPE Credits on this webinar. Cybersecurity is one of the largest concerns facing businesses today and hackers continuously develop diverse ways of penetrating your cybersecurity defences. By adopting the mindset of a hacker, you can be one step ahead of malicious attacks and improve your cybersecurity infrastructure. On this CPE webinar our panel of experts will address how and why security gaps arise in IT security posture, and provi...
March 16, 2023
Organizer: Executive IT Forums
Location: Webcast
Add Favorite
Risk Management: A Group Effort
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it i...
March 9, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search