Putting Cloud Smart Into Practice
As federal agencies work to fulfill their critical missions from home during the COVID-19 pandemic, cloud, with its scalability, reliability, and security has become increasingly important in allowing government to get things done in a cost effective manner. However, nearly one year after OMB announced its Cloud Smart policy, many agencies are still struggling with their strategic migration to cloud, and when the federal workforce returns to t...
FCW Workshop: Zero Trust
Zero Trust is an important part of an overall digital transformation strategy because it recognizes the challenges of today's hybrid networks. Virtually every agency now has data and applications both on premises and in the cloud; The zero trust model secures those assets by authenticating both the users and their devices and by micro-segmenting the systems so that access to one part does not allow access to all. Advanced identity and access m...
Powering Mission Readiness: Mitigating...
CISA, ODNI and the DOD are working together to promote the magnitude of supply chain security and risk management. Breaches in the supply chain create an opportunity for malicious software or hardware to be installed on equipment. Lack of awareness or validation of the legitimacy of hardware and software presents a serious threat to users’ information and the overall integrity of a network environment.
Enabling Secure Cloud Services for Telework
Organizations have long struggled with ways to keep their environments secure across all access modalities. Complicated digital transformation and IT modernization initiatives that organizations have been forced to reckon with since the explosion of cloud workloads and mobile endpoint access have led to organizations being less prepared for events such as an extreme telework scenario. Providing scalable, consistent and frictionless access has...
Data & Analytics Workshop
Data is a natural byproduct of the business of government. However, federal agencies have been challenged as they try to gather, cleanse, standardize, mine and share that data. Now, however, new legislation (the Evidence Based Policymaking Act of 2019) and policy (OMB memo M-19-23) lay out the path agencies must follow to identify the data they plan to collect, use or acquire, as well as the methods and analytical approaches to facilitate the...
Data Security in a Perimeterless World
Historically, organizations have taken a perimeter based approach to cyber security, with the belief that a strong perimeter protected the IT infrastructure behind it. But, as agencies modernize legacy systems and move apps, systems and workloads to the cloud – and more employees, contractors and citizens connect remotely and from multiple devices – something is happening across federal networks; the perimeter is dissolving. Data i...
Securing the Government Cloud
As federal agencies continue to modernize their technological infrastructure, securing the cloud remains a priority. Across government, innovative approaches and standards to cloud computing continue to develop, including the upcoming release of the Department of Homeland Security’s Trusted Internet Connection guidance (TIC 3.0), forthcoming FedRAMP automation, and, of course, the looming JEDI transition in the Department of Defense, to...
The Next Big Network
As many federal agencies move away from on-premise networks, they are often plunged straight into the exciting, but intimidating, world of future network architectures. This information technology transformation allows government to achieve mission success with more agility as well as analyze the increasing amounts of data. It is important that any agency's modernization roadmap considers how their network can handle the Internet of Things and...
Digital Defense: How Identity Managemen...
Modernization of digital infrastructure is an essential part of keeping the Defense community’s mission on track. However, as cyber attacks loom, it is also vital that government’s critical information stays protected. Organizations must improve the agility of mission planning and delivery while ensuring that the right people have access to the right resources at the right time. How can identity, credential and access management to...
May 11, 2020
Organizer:
Okta Location:
Webcast
Artificial Intelligence in Action
Artificial intelligence might feel like something from the future, but many federal civilian and defense agencies have already integrated this technology into their plans for mission delivery. Leveraging AI in government operations promises to increase speed, efficiency and analytical power; it even has the capability to strengthen the security of data and critical infrastructure. As government agencies implement new technologies, they must do...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.