Zero Trust for Critical Infrastructure
Given the most recent Zero Trust guidance and directives from the Whitehouse, OMB, CISA, NSA and DoD, what role does Zero Trust Architectures play in the foreseeable future? How and where will this impact our IT Critical Infrastructure? What impact will Zero Trust have on the federal government’s expanding adoption of IoT? During this digital event government and industry experts will explore what Zero Trust means for the nation’s...
Zero Trust for Critical Infrastructure
Given the most recent Zero Trust guidance and directives from the Whitehouse, OMB, CISA, NSA and DoD, what role does Zero Trust Architectures play in the foreseeable future? How and where will this impact our IT Critical Infrastructure? What impact will Zero Trust have on the federal government’s expanding adoption of IoT? During this digital event government and industry experts will explore what Zero Trust means for the nation’s...
FCW Summit: CDM
The Continuous Diagnostic and Mitigation (CDM) program has matured and broadened its offerings and full deployment of agency dashboards is on the horizon. In the last year, however, ominous high profile breaches in commercial and critical infrastructure networks have highlighted the continued importance of strong cybersecurity across federal networks. In the wake of the pandemic, federal IT managers are faced with an increasingly complex cyber...
Building Cyber Resiliency
Detecting unauthorized activity is a critical component of any agency’s security posture. Over 19% of all reported breaches occurred due to stolen credentials, insider errors and unauthorized access. Our current administration has made cybersecurity a focal point for the Federal Government and it’s sub-sectors. Now, more than ever, having a solution to address this nation’s constant attacks is imperative to the health of you...
Cybersmart - Election Security
Rapidly evolving discussions around election integrity have invited no shortage of new perspectives on the security of one of our most sacred democratic tenets. As federal, state and local governments gear up for another election season, how can officials ensure the election technology is secure? During this event, we’ll speak with a number of election security professionals and government information technology experts to separate fact...
GCN Roundtable Webcast: Managing the Sp...
Join us as we take a look at what’s required of agencies by the Executive Order on Cybersecurity and the deadlines for meeting those requirements. Hear from government and industry about the best approaches and the challenges agencies face.Attend this live webcast to learn more about: Adopting security best practices Advancing toward zero trust architecture Speeding the move to secure cloud services Facilitating access to cyber security...
Building the Platform of the Future
As the government workforce continues to follow a hybrid model of remote and in-person service delivery, it’s widely recognized that cloud is the key ingredient for rapidly responding to change. Instead of reacting to unforeseen crises, government agencies must proactively align their technology to quickly respond to citizen needs, from the devastating impact of a hurricane to the more measured task of implementing social service policy...
FCW Roundtable Webcast: Zero Trust is H...
Zero Trust is now an integral part of the federal government’s strategy to bolster Cybersecurity in the face of increasingly aggressive and resourceful attackers, infiltrators and hackers. Understanding how pieces of enterprise networks play together and with Zero Trust is a crucial part of implementing it, but less noticed challenges will also present themselves as agencies move ahead with implementation. Anticipating those areas can al...
Genius Machines 2021 | Part 4
Artificial intelligence has evolved from a staple of science fiction to a real world, strategic priority of the United States. Increases in computing power and the emergence of large data sets to train ever more powerful machine learning algorithms have created real world applications and success stories. During this year-long series, Defense One and Nextgov will explore all aspects of artificial intelligence and its applications in government.
October 28, 2021
Organizer:
NextGov Location:
Webcast
Elevating the Federal Cybersecurity Dis...
Time and time again, data breaches demonstrate the pitfalls of relying on detection to identify malicious activities taking place on the network, rather than prevention of the threat in the first place. The emphasis—post event—has been what the agency did wrong. But, what if we took a different approach that allowed agencies to share what has been working for them? Both before and after. Some tips and lessons from folks who have be...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.