Zero Trust Implementation
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed, time-consuming, and agency...
Financial Fitness for U.S. Veterans
As we prepare to celebrate National Veterans and Military Families Month in November, we are excited to announce that on Wednesday, November 8th at 3:00pm ET, we will be hosting a Financial Fitness for United States Veterans event. During the session, a panel of Veterans from Equitable Advisors will discuss navigating finances after military service and how to develop strategies to manage and secure financial well-being. Equitable President Ni...
Update: CDM
The Continuous Diagnostics and Mitigation (CDM) program is the process government agencies use to move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to support government-wide risk-based cybersecurity solutions to assist participating agencies improve their security posture consistently and cost-effectively. In this virtual workshop, government & industry experts will provide the following: a status u...
Air & Space Warfighters in Action: Mino...
Join us for a virtual panel discussion on October 23, 2023 at 10 a.m. ET with two wing commanders at Minot Air Force Base, N.D.: Col. S. Daniel Hoadley, Commander of the 5th Bomb Wing, and Col. Kenneth C. McGhee, Commander of the 91st Missile Wing. Members of the 5th Bomb Wing are continually deployed around the world, taking part in combat and support operations as a part of the Global War on Terrorism. Bomber deployments to Andersen AFB, Gua...
Cyber Solutions Fest 2023: Industrial C...
A common misconception is IT security practices can be directly applied to ICS environments. However, a “copy and paste” of traditional IT security into industrial control systems could have problematic or even devastating consequences. The consequences of modern ICS cyber-attacks can include but are not limited to widespread power grid blackouts, failure or physical destruction of critical engineering equipment, massive business f...
SecureWorld Government Virtual Conference
SecureWorld events and programming foster Growth, Access, and Excellence among cybersecurity professionals. SecureWorld is… the stepping stone to grow in your abilities and career path SecureWorld is… access to the knowledge and solutions you need, in the place you live SecureWorld is… a unique experience with excellence in both speakers and content For more than 21 years, SecureWorld has been tackling global cybersecurity...
FOIA Automation
Since 1967, the Freedom of Information Act (FOIA) has provided the public the right to request access to records from any federal agency. Federal agencies are required to disclose the information requested under the FOIA, unless it falls under one of nine exemptions which protect interests such as personal privacy, national security, and law enforcement. In recent years, federal agencies have been inundated with FOIA requests creating challeng...
Around the World with Secure Identity O...
A full-day virtual event focusing on innovation in biometrics across the hottest vertical markets: financial, travel & hospitality, government, healthcare, and the enterprise. Get ready for a day of interview-style sessions and keynote presentations with identity experts, curated to educate, motivate, and inform you about biometrics and digital ID across the most crucial market sectors including finance, healthcare, government, travel, and...
Advancing Digital Equity in State and L...
To advance digital equity, all individuals and communities must have the technology capacity required to access essential services and fully participate in democracy, society, the economy and lifelong learning. We are not there yet, but state and local governments can make significant progress by building more inclusive IT teams, engaging with community groups to better understand their constituents, emphasizing human-centered design, driving...
ATARC Zero Trust Lab Phase 2 Demonstrat...
Blackwood has assembled a comprehensive zero-trust environment used to architect, integrate, test, and deploy numerous technologies aimed at aligning with zero-trust frameworks and methodologies. In partnership with ATARC, Blackwood has demonstrated comprehensive coverage of the various scenarios established by the Zero-Trust Working Group.
September 22, 2023
Organizer:
ATARC Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.