70 past events found
+ 5 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
How To Be Prepared Against Evolving Sof...
Combating modern-day software supply chain attacks is significantly more complicated than in the past. Adversaries are getting craftier and are no longer waiting to exploit publicly disclosed vulnerabilities to launch a cyberattack. By shifting their focus “upstream,” adversaries can infect a single open source component, which will then be distributed “downstream” using legitimate software workflows and update mechanis...
September 22, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Responsible AI & Speed to Mission: How...
With rapidly changing priorities, new threats, and an increasingly high expectation from citizens for digital services, government agencies must discover new ways to streamline their delivery of digital applications and systems. On top of that, they need to ensure that data and AI are being used responsibly. Responsible AI ensures that end-to-end model management addresses the specific risks of AI (i.e., discriminatory biases and lack of trans...
September 15, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Identity: The First Pillar of Zero Trust
Zero trust is vital for our nation's cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn't have to be. In this engaging session, you'll learn: Why Identity is Pillar #1 How Identit...
September 13, 2022
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
When All Fails: How To Be Cyber Resilient
There is a focus on ensuring an agency’s cybersecurity is as up to date as possible. But, what does one do when all systems put in place to assist in threat attacks break down? Given the high stakes in today’s cyber threat landscape, a good cyber strategy must be based on the assumption that, sooner or later, the agency’s defenses will fail. This assumption places the agency’s one step ahead of the attack: knowing that...
September 8, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Industry Profile: Building a Risk Manag...
Changes to the Cybersecurity Maturity Model Certification (CMMC), increased threats and risk to organizational data, third party vendor risk and increased numbers of compliance and framework requirements, makes it challenging to know where to start. Join this webinar to hear directly from one of your peers, Eric Matthews, Senior Strategic Advisor) from Alutiiq, about how he was able to effectively adopt and deploy the Cyturus Cyber Risk Tracke...
September 8, 2022
Organizer: Cyturus Technologies Government Team at Carahsoft
Location: Webcast
Add Favorite
Upskilling The Federal Workforce to Mee...
Technology is arguably at the center of every agency today. Introducing new technologies is important but in order for an agency to use them effectively, the workforce must evolve with the tech. Closing the gap between technology skills that are needed for mission success and those that are available is one of the most important challenges government agencies face. There doesn’t seem to be a week that goes by without a new publication on...
September 1, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
The Quantum Security Challenge
Quantum computing is advancing rapidly, and its impact is likely to be large—their potential computational power that could render today’s encryption algorithms obsolete. To address this looming threat, the White House issued a National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM 10) this May. The NSM 10 fact sheet states that ...
August 25, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
ATARC Identity and Access Management Vi...
Digital transformation and the increasing reliance on remote business continue to accelerate the adoption of new identity and access management (IAM) approaches and technologies. IAM and IT leaders face new business demands that require digital trust across every interaction and channel. The imperative for 2022 is the need to empower IAM teams to support ongoing change. This includes change driven by the continued evolution of technology best...
August 2, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
The New Workforce and Where We Are Heading
The COVID-19 pandemic has dramatically changed the way that the workforce is created and maintained. With the “Great Resignation,” higher numbers of remote/hybrid employees, and the challenges of creating interpersonal relationships with asynchronous work, how are Federal agencies utilizing emerging technologies to help close the gaps? A large call for upskilling and diversifying the workforce requires a fresh perspective on the en...
July 28, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Stronger Together: How to Empower Feder...
Cyberthreats and breaches can be detrimental to the safety of the American people. In a recent study by the Washington Post, IT and cybersecurity experts state that the Federal agencies are more vulnerable to threats and attacks than before. The last five years have seen an increase in the success of Federal agencies’ cybersecurity due to legislation and funding. However, the threats that we are now facing have advanced in the five years...
July 21, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search