Back to Search Begin New Search Save Search Auto-Notify
A Government Guide to Zero Trust | Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Executive Order includes directives to CISA and GSA to develop a cloud security strategy and provide guidance to agencies for implementation.Address...
November 10, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
A Government's Guide to Zero Trust Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Cybersecurity and Infrastructure Security Agency views this as setting an example for state and local governments looking to strengthen their securi...
November 9, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust Action Plan: Progress and Be...
The animating concept at the heart of the Cybersecurity Executive Order issued in May is Zero Trust – to structure cybersecurity around the premise that every person, every device, whether inside or outside its’ systems, is not to be trusted and must be verified before being granted access. Setting this as core to modernization is reflected in the awards just made by the Technology Modernization Fund. Three of the six public awards...
November 3, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How Intelligent Automation Is Helping H...
In the iconic “Star Trek” – whether the TV series of the 1960s or the two-movie adaptations over the past 40 (!) years – Dr. McCoy uses a handheld scanner to examine, diagnose, and treat his patients. What “Star Trek” doesn’t show is the vast amount of machine learning (ML) and artificial intelligence (AI) that culminated in the creation of the scanner’s capabilities. Though this level of compute...
October 28, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Defense Digital Transformation: A U.S.-...
George Bernard Shaw famously once said that England and America are two countries separated by a common language. In the digital domain, however, zeros and ones transcend that difference. In diplomatic circles, the U.S. and the U.K. are known to have a closely aligned relationship. That extends to the military, as well - both are pursuing digital transformation strategies to facilitate adoption of emerging, innovative technologies, such as art...
October 26, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
CyberNation: Identity, Credential, and...
As the Defense Department moves to connect everything, everywhere through the services and mission partners, creating secure points to the networks using identity, credentialing and access management tools becomes ever more crucial to military operations. Creating a secure, cross-service network is complicated by hybrid cloud systems and ever-evolving technologies. This 60-minute webinar show will bring together thought leaders from government...
October 21, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Necessity: The Mother of Innovation for...
As the global pandemic drags into its second year, pressure grows on the healthcare sector – whether public or private, federal, state or local – to deliver innovative, data-based services to patients. The Office of the National Coordinator for Health Information Technology, in its 2020-2025 Federal Health IT Strategic Plan, identified building a secure, data-driven ecosystem to accelerate research and innovation and connecting hea...
October 19, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Facing the Threat of Ransomware
There were more than 2,300 ransomware attacks against all levels of government, healthcare facilities, and schools and higher education institutions in 2020, and the attacks have continued this year. Yet state, local, and education (SLED) organizations are ill-equipped to respond to such attacks, lacking the resources and capabilities to defend against or respond to them. The Cybersecurity and Infrastructure Security Agency has established Sto...
October 13, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Headlines in Cybersecurity: What States...
The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege. Join us for these five one-hour webinars spread over five days,...
October 8, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Headlines in Cybersecurity: What States...
The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege. Join us for five one-hour webinars spread over five days, as tho...
October 7, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search