Back to Search Begin New Search Save Search Auto-Notify
FCW Workshop: Zero Trust
Zero Trust is an important part of an overall digital transformation strategy because it recognizes the challenges of today's hybrid networks. Virtually every agency now has data and applications both on premises and in the cloud; The zero trust model secures those assets by authenticating both the users and their devices and by micro-segmenting the systems so that access to one part does not allow access to all. Advanced identity and access m...
May 19, 2020
Organizer: 1105 Public Sector Media Group
Location: Virtual
Add Favorite
Powering Mission Readiness: Mitigating...
CISA, ODNI and the DOD are working together to promote the magnitude of supply chain security and risk management. Breaches in the supply chain create an opportunity for malicious software or hardware to be installed on equipment. Lack of awareness or validation of the legitimacy of hardware and software presents a serious threat to users’ information and the overall integrity of a network environment.
May 19, 2020
Organizer: Defense One and Nextgov
Location: Webcast
Add Favorite
Enabling Secure Cloud Services for Telework
Organizations have long struggled with ways to keep their environments secure across all access modalities. Complicated digital transformation and IT modernization initiatives that organizations have been forced to reckon with since the explosion of cloud workloads and mobile endpoint access have led to organizations being less prepared for events such as an extreme telework scenario. Providing scalable, consistent and frictionless access has...
May 19, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Data & Analytics Workshop
Data is a natural byproduct of the business of government. However, federal agencies have been challenged as they try to gather, cleanse, standardize, mine and share that data. Now, however, new legislation (the Evidence Based Policymaking Act of 2019) and policy (OMB memo M-19-23) lay out the path agencies must follow to identify the data they plan to collect, use or acquire, as well as the methods and analytical approaches to facilitate the...
May 13, 2020
Organizer: 1105 Public Sector Media Group
Location: Webcast
Add Favorite
Data Security in a Perimeterless World
Historically, organizations have taken a perimeter based approach to cyber security, with the belief that a strong perimeter protected the IT infrastructure behind it. But, as agencies modernize legacy systems and move apps, systems and workloads to the cloud – and more employees, contractors and citizens connect remotely and from multiple devices – something is happening across federal networks; the perimeter is dissolving. Data i...
May 13, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Securing the Government Cloud
As federal agencies continue to modernize their technological infrastructure, securing the cloud remains a priority. Across government, innovative approaches and standards to cloud computing continue to develop, including the upcoming release of the Department of Homeland Security’s Trusted Internet Connection guidance (TIC 3.0), forthcoming FedRAMP automation, and, of course, the looming JEDI transition in the Department of Defense, to...
May 12, 2020
Organizer: Defense One
Location: Webcast
Add Favorite
The Next Big Network
As many federal agencies move away from on-premise networks, they are often plunged straight into the exciting, but intimidating, world of future network architectures. This information technology transformation allows government to achieve mission success with more agility as well as analyze the increasing amounts of data. It is important that any agency's modernization roadmap considers how their network can handle the Internet of Things and...
May 12, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Digital Defense: How Identity Managemen...
Modernization of digital infrastructure is an essential part of keeping the Defense community’s mission on track. However, as cyber attacks loom, it is also vital that government’s critical information stays protected. Organizations must improve the agility of mission planning and delivery while ensuring that the right people have access to the right resources at the right time. How can identity, credential and access management to...
May 11, 2020
Organizer: Okta
Location: Webcast
Add Favorite
Artificial Intelligence in Action
Artificial intelligence might feel like something from the future, but many federal civilian and defense agencies have already integrated this technology into their plans for mission delivery. Leveraging AI in government operations promises to increase speed, efficiency and analytical power; it even has the capability to strengthen the security of data and critical infrastructure. As government agencies implement new technologies, they must do...
May 7, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Updating Government's Data Experience
As the nation’s digital infrastructure expands, so does the massive amount of data that government accumulates. In this unprecedented teleworking moment, access to and security for key information is more important than ever. Data can provide powerful insights, and even solutions, for challenges that agencies face. However, many struggle with how to properly harness and store data in a way that is truly efficient and doesn’t disrup...
May 6, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Back to Search Begin New Search