Back to Search Begin New Search Save Search Auto-Notify
AI Roundtable: Unlocking Efficiency ...
From intelligent automation to advanced data analytics, real-world artificial intelligence (AI) applications are driving measurable improvements in efficiency, transparency, and service delivery. For example, AI-powered chatbots are handling routine questions from citizens about such topics as how to apply for benefits, freeing up government employees to work on more complex issues. And AI is useful in optimizing resource allocation, such as i...
September 9, 2025
Organizer: Fedinsider
Location: Webcast
Add Favorite
Embedding Trust into AI for the Public Sector
Artificial intelligence is transforming how government agencies defend, protect, and deliver on their missions. From accelerating cyber threat detection to streamlining operations, AI offers powerful new capabilities—but only if it’s built on a foundation of trust, transparency, and resilient, secure data systems. Public sector leaders face a balancing act: harnessing AI’s potential while ensuring the systems, data, and gover...
September 11, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Hot Topics in Cybersecurity Day 1: Resp...
Ransomware is one of the biggest cyberthreats facing government at all levels in the U.S. According to the Federal Reserve Bank of St. Louis, there were 90,837 local government entities in 2022. A 2024 study found that ransomware attacks against state or local agencies declined in last year – only about a third of study participants said their agency had been hit by such an attack. While this is far better than 2023, when 69% of particip...
September 16, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Hot Topics in Cybersecurity Day 2: Main...
After seeing first-hand the massive effects of supply chain disruption during the pandemic and the impact of accidentally using infected open-source software by software providers, state and local governments are aware of the risks of supply chain disruptions due to a cyber attack. Agencies have to broaden their thinking about where risks may be encountered. For instance, cybersecurity experts see the Salt Typhoon incursion into several U.S. t...
September 17, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Hot Topics in Cybersecurity Day 3: The...
The federal mandate that agencies utilize a Zero Trust architecture to strengthen cybersecurity has been in place for four years, and most federal agencies have made excellent progress toward meeting the deadlines spelled out in the Executive Order. State and local governments are not covered by the federal EO, but many of them are pursuing their own zero trust policies or evaluating how to implement them. After all, having a zero trust archit...
September 18, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
The Future of National Cybersecurity an...
As artificial intelligence, machine learning, and automation continue to evolve, organizations must rethink information sharing, response coordination, and risk mitigation to strengthen the cyber ecosystem and reshape cybersecurity resilience. Among the challenges: balancing innovation with security, privacy, and ethical considerations as agencies navigate the ever-evolving cyber landscape. Join us as thought leaders from government and indust...
September 22, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Improving Data Security with Performanc...
Performance-based programs are essential for driving federal government transformation. They directly align resources and incentives with measurable outcomes. Unlike traditional models that emphasize activity over impact, performance-based approaches ensure that agencies are accountable for service delivery of results that matter—such as improved citizen services, operational efficiency, and mission readiness. Learning Objectives: Unders...
September 24, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Emerging Technology: Trends in Digital...
According to Gartner, the major digital modernization trends are aimed at addressing three key priorities: managing risk, rethinking value propositions, and streamlining operations. There are specific types of technology that address each of these; for instance, adaptive security – such as a zero-trust architecture – is central to risk management. Those priorities are often reflected in the investments being made by the Technology...
September 25, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
5G Series Part One: 5G/NextG and AI
Advances in network slicing technology make it possible for service providers to create multiple customized virtual networks within a shared infrastructure environment. By harnessing the power of artificial intelligence (AI) to manage and automate Radio Access Network (RAN) components in cellular networks, the networks can be streamlined and optimized for functionality, performance, and security. For instance, isolating individual network slic...
September 26, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
5G Series Part Two: Communications for...
The rapid adoption of artificial intelligence (AI) is transforming both the design and use of communication networks. Robust telecom infrastructure — such as private 5G, SD-WAN, and edge computing — is critical for transporting and processing the massive data flows underpinning AI workloads across industries. At the same time, AI is evolving communications itself, powering network automation, predictive analytics, and intelligent m...
September 29, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search