Managing Zero-Trust in a Complex World
The Presidential Directive is driving federal agencies, their employees, and customers, who rely on the ability to communicate and collaborate remotely. These remote work capabilities were accelerated by the pandemic. The Zero Trust model designed by Cisco provides balance between security and usability for the workforce, workloads, and workplace. Zero Trust provides a comprehensive approach to securing all access across applications and envir...
Power Missions Success with Secure Coll...
With federal agencies under pressure to securely power digital processes across their communities, digital collaboration is essential to drive mission critical services. Now more than ever, organizations are expected to extend the same seamless, modern workflows across their network of stakeholders in order to accomplish major missions. But, when critical processes are burdened with paper-based workflows, legacy IT, or siloed data, mission su...
Power Mission Success with Secure Colla...
With federal agencies under pressure to securely power digital processes across their communities, digital collaboration is essential to drive mission critical services. Now more than ever, organizations are expected to extend the same seamless, modern workflows across their network of stakeholders in order to accomplish major missions. But, when critical processes are burdened with paper-based workflows, legacy IT, or siloed data, mission suc...
How CISA can help defend your data
The frequency and ferocity of ransomware attacks grew steadily throughout 2021, prompting the federal government to accelerate both defensive and educational efforts. The Cybersecurity and Infrastructure Security Agency, which is part of the U.S. Department of Homeland Security, is a valuable resource for not just federal agencies, but state and local government organizations as well. In this webcast, GCN Editor-in-Chief Troy Schneider will ex...
Evolving at the Pace of Cyber Threats
Cybersecurity was already an acute challenge for government leaders, with high profile data breaches and ransomware attacks costing organizations millions of dollars and eroding trust with the public they serve. Since the beginning of the pandemic, as the workforce became more distributed and internet-facing technologies became core to continuity of operations, cybersecurity is key to meeting government’s essential mission. In a world wh...
DoD Looks to the Constellations
The Space Development Agency, founded in March 2019, was founded to pursue the new National Defense Space Architecture (NDSA). The NDSA is routed in the same principles as Starlink, focusing on small, cheaper satellites operating in LEO with different sats focused on different missions. The architecture is designed to be cheaper, more survivable and in some ways more capable than existing US military space-based capabilities. Plans call for hu...
Roadmap to Modernization
Join us for the latest edition of Roadmap to Modernization, where government leaders reveal how they are turning insights and ideas into action through the use of new technologies such as AI and RPA and the adoption of Cloud. We’ll also discuss how they are thinking differently though Agile and DevSecOps to bring new technologies quickly to the edge. You won’t want to miss this installment of Roadmap to Modernization; register today!
Modern Security Approaches to Achieving...
With the multiplication of advanced persistent threats, supply chain attacks, and ransomware putting our national security at risk, comprehensive network visibility is a cyber security requirement for U.S. federal agencies.Recognizing this reality, the Office of Management and Budget (OMB) issued a directive in August 2021 (OMB M-21-31) instructing executive branch departments and agencies to modernize their event logging. These requirements e...
Modernizing Legacy JEE Applications
Traditional JEE applications have served organizations well over the past two decades. However, they were built with fundamental assumptions that no longer hold true in the world of cloud computing.More specifically, these applications were built on the idea of static infrastructure and fixed assumptions around the workload capacity and even security. Increasingly, cloud architectures have become more dynamic leaving these legacy JEE workloads...
Adapting IT: The Future of Finance
For government, the ability to adapt quickly and continuously is crucial if agencies are to keep pace with rapid, systemic change. The effort to improve financial reporting is often hindered by legacy systems and outdated processes. For years, there has been a massive push to improve auditability, data standards and transactions, making them increasingly efficient. Technology advances, including embedded AI, can transform siloed data from buri...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.