Back to Search Begin New Search Save Search Auto-Notify
Addressing Security Holes in Air Gapped...
As IT and security deployments migrate to the cloud, security gaps in air-gapped systems can be created unless attention focuses on threats such as data transfer from external storage media – for example, USB devices. Paradoxically, many agencies continue to maintain critical systems and data on air-gapped servers or on systems running end-of-life operating systems. The U.S. Department of War maintains critical air-gapped systems even as...
December 3, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
How to Translate AI into Stronger Cyber...
There have been plenty of articles warning of the cybersecurity risks posed by artificial intelligence (AI), whether it is bad actors – from hostile nation-states to cyber criminals – or new attack vectors caused by AI implementations. At the same time, numerous other reports point out that AI can strengthen cybersecurity. For agencies looking to incorporate AI into their systems, cybersecurity is a great place to focus. AI tools c...
November 13, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Scaling AI Across the Business
In 2025, scaling AI is no longer a research and development side project; it’s an operational imperative. And yet, many organizations struggle to see a meaningful return on investment (ROI) at the speed the business demands. Successfully scaling AI across the enterprise requires a return to the foundational principles of high-performing technology organizations. These principles were first popularized through DevOps and have evolved into...
September 16, 2025
Organizer: Crowe, LLC
Location: Webcast
Add Favorite
Cyber Resilience in a Turbulent Environ...
Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources. The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent. This series o...
September 3, 2025
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
State & Local Government: Streamline Op...
At every level of government there are millions of records that predate the computer era. Many are on paper – whether handwritten or typed – while others may be on microfiche. Converting this vast amount of potential information into usable forms is both more affordable than ever and creates the potential for significant improvements in government operations. Modernizing government systems means finding ways to turn these into digi...
August 26, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Engaging Gen Z for Federal Careers: A C...
Gen Z is reshaping the workforce—bringing fresh perspectives, valuable hard and soft skills, and new expectations for what they want out of employers and their career journeys. There is an incredible opportunity for federal agencies to attract the next generation of talent to the public sector. This is particularly important because federal agencies are at a crossroads in their talent acquisition efforts. Approximately 30% of employees a...
August 6, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Fixed Wireless Access: The Path to 5G C...
The federal government has been on a journey to modernize its IT infrastructure in support of the mission and the strategic initiatives that each executive department has identified. This commitment to modernization is driving the federal government to explore new technologies that can enhance its operational capabilities and infrastructure. The implementation of 5G promises to provide faster network speeds, ultra-low latency connectivity, and...
July 31, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
The Two-Edged Sword of AI in Cybersecurity
Artificial Intelligence (AI) is transforming cybersecurity for the better—empowering teams to detect threats faster, reduce false positives, and identify risky behavior before it becomes a breach. But there are risks associated with AI: first, that AI tools currently are new to organizations and under-regulated for their own cybersecurity, so require careful review; also, as defenders become more sophisticated with those AI tools, so do...
July 16, 2025
Organizer: Fedinsider
Location: Webcast
Add Favorite
Mission-Centered Design for Real World...
Join us for a dynamic FedInsider discussion on how mission-centered system design can transform public sector services into improved, outcomes-driven models. As expectations around cost reduction and efficiencies continue to drive change, government and industry leaders must go beyond incremental improvements to reshape how citizen experiences are designed and in fact delivered. This webinar will explore how focusing on mission outcomes can pr...
July 8, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Building a Future-Ready Federal Workfor...
As the pace of technological change accelerates, the federal workforce must be equipped with the agility to adapt. Cross-skilling, upskilling, and reskilling are no longer optional—they are essential strategies for mission readiness across cybersecurity, cloud management, data governance, and more. Emerging technologies like artificial intelligence illustrate the growing need for cross-domain expertise: cybersecurity professionals must a...
June 12, 2025
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search