Back to Search Begin New Search Save Search Auto-Notify
Budgeting Ideas to Reach a Zero Trust Future
Ransomware, malware, phishing, DDoS, social engineering, zero-day exploit, botnets – the list of types of attacks out there is long enough to keep even the most seasoned cybersecurity expert awake at night. And with the increased use of remote computing, the cyber attack surface grows as more edge devices are added to networks. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity. In th...
January 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
State & Local Governments: AI Can Set a...
Machine learning and artificial intelligence already are playing a significant role in reworking call centers, in government agencies and private industry alike. Just picture the chatbots that show up every time you go to the online portal for the Department of Motor Vehicles, for instance, and get prompted to renew your auto registration online. To date, call center agents and customers both prefer human interaction. As generative AI (genAI)...
December 13, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Vision 2024: The Future of Technology i...
Government at all levels is moving as quickly as possible to integrate new solutions and overhaul processes that need streamlining. At the same time, officials are keeping close watch on AI and other emerging technologies, wary of the law of unintended consequences. For instance, in early September California Gov. Gavin Newsom signed an executive order directing state agencies to study the development, use and risks of generative artificial in...
December 7, 2023
Organizer: FedInsider
Location: San Jose, CA
Add Favorite
Talking Tech: Continuous Compliance for...
At the height of the pandemic in 2020, the Federal Employee Viewpoint Survey found that almost half of federal employees worked remotely. By the end of 2022, the same survey found that 14% of employees were working remotely and another 25% were teleworking at least three days a week. The sudden exodus from government office buildings shone a bright light on the significant challenges it posed to security compliance operations – a challen...
November 30, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Be Prepared: The Cyber Wild West is Sti...
Events on the world stage are also playing out in cyberspace. Nation-states continue their kinetic wars into internet realms, commit crimes such as financial and intellectual property theft, and pursue their global strategic goals hidden from view. Ransomware attacks are increasing again. It’s a tough time for cybersecurity professionals. “We’re seeing attackers cause bigger impacts with less skills. They’re also more b...
November 29, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Breaking the System into Tiny Little Pi...
The cybersecurity slogan for zero trust is a simple one: Never trust, always verify. This slogan fits into the Department of Defense mindset, which is always focused on how to reduce risk, but it’s a challenge to apply it to the federal government’s largest agency. An important tool in pursuing zero trust is to implement microsegmentation – partitioning a network into small, isolated sections to reduce the attack surface in e...
November 28, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Prioritizing Mission Critical Climate R...
The federal government has been proactive in continuity of operations (COOP ) planning since at least the 1950s, when President Eisenhower issued executive orders directing various measures agencies should take to be prepared for a possible nuclear war. The need for COOP leads naturally to the question of resilience – how quickly agencies can recover from events beyond their control. Climate change is a slow-moving tsunami of many smalle...
November 9, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Unlocking Modernization with AI Managem...
Many government agencies wrestle with their legacy systems and outdated processes every day, especially when it comes to cybersecurity and data flow. Agencies usually have multiple servers, private or hybrid clouds, and thousands of end points, from desktop computers to smart phones, tablets to sensors, generating millions of bits of data. An army of data analysts wouldn’t be able to keep up with the volume of logs being generated (and n...
November 8, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Generative AI in Government
It is hard to believe that ChatGPT isn’t even a year old yet, when you look at the tidal wave of new apps that have been released in its wake. After decades where the phrase “artificial intelligence” was sufficient, commentary in the public sphere has already moved to the next level – generative AI. What’s the difference? As Forbes describes it, “Traditional AI systems are primarily used to analyze data and...
November 7, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Cyber Resilience 2023 - Day Two: The Ti...
Cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors – whether nation-states or common criminals – are constantly searching for new vulnerabilities and creating new tools to attack them. On the other, all government agencies and private sector companies are trying to remain alert and find new ways to fend off those attacks. Among the innovative ways agencies are responding to the ever-evolving threat land...
November 2, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search