Making Sense of the Cyber Threat Environment
In today’s interconnected digital landscape, cyberattacks have become a constant threat, impacting individuals, organizations, and nations alike. As technology advances, so do the methods and sophistication of cyber adversaries, making it crucial for all stakeholders to stay informed and up to date on the latest mitigation strategies. The cyber threat landscape continues to evolve and nothing ever goes away. Phishing scams have been arou...
August 27, 2024
Organizer:
FedInsider Location:
Webcast
How the US Navy Improves Underwater Min...
The U.S. Navy uses machine learning (ML) models for underwater target threat detection by unmanned underwater vehicles (UUV). However, without a way to monitor and improve ML model performance at scale, models were slow to adapt to changing underwater conditions or enemy tactics - unable to “learn” based on recent field activity. The Navy partnered with the Defense Innovation Unit (DIU) as part of Project Automatic Target Recogniti...
The Balancing Act: Governance and Assur...
AI's integration into organizations is reshaping the threat landscape, presenting both opportunities and challenges. Navigating this future responsibly requires the proactive development of ethical AI frameworks focused on governance, assurance, and regulatory compliance. This talk will delve into the core components of an AI Corporate Responsibility Framework, address evolving threats and highlight strategies for policy implementation. Attend...
August 27, 2024
Organizer:
ISACA Location:
Webcast
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and eva...
Washington D.C. Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
August 22, 2024
Organizer:
FutureCon Location:
Washington, DC
INTERFACE Boise 2024
Welcome to INTERFACE Boise 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise,...
2024 Public Sector 5G Summit: Create Op...
5G networks have become more common over the past few years. At the 5G Americas conference in October 2023, the keynote speaker said the U.S./Canada region leads the world in 5G subscription penetration (41%), followed by China (33%), and Europe (just 13%). Additionally, while 33% of US. devices use 5G, 51% of data traffic is 5G. Government agencies have been slower to adopt 5G for their networks, however, in part because of the higher costs a...
August 22, 2024
Organizer:
FedInsider Location:
Reston, VA
Mobility Solutions for Government
GSA’s Wireless Mobility Solutions program offers a range of mobility solutions supporting government customers. Attend this event to learn:How multi-carrier managed mobility solutions simplify network management, optimize costs, and support a secure and productive mobile workforce;The latest features and functionalities of web-based SMS platforms and how government agencies are using web based SMS texting and paging solutions to streamli...
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open t...
Dedicating Cybersecurity Resources to C...
Power grids, water systems, transportation networks and other vital services are essential to communities but lack substantial cyber defenses. Their vulnerabilities make them tempting targets, whether for nation-states or cybercriminals. For instance, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning earlier this year that a Chinese state-sponsored hacking group already has footholds in multiple networks operated by...
August 21, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.