The Modern Endpoint - It's Personal
Today’s workforce isn’t tethered to laptops – it’s powered by mobile. It’s often a primary way many employees connect to email and other mission-critical resources but not treated that way from a security standpoint. Traditional Mobile Device Management (MDM) solutions weren’t built to detect advanced threats or align with Zero Trust principles. They offer basic control, but not the telemetry, risk context,...
July 10, 2025
Organizer:
Fedinsider Location:
Webcast
How to Get Your Security Aligned with t...
Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet. Among best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines the b...
July 9, 2025
Organizer:
FedInsider Location:
Webcast
Mission-Centered Design for Real World...
Join us for a dynamic FedInsider discussion on how mission-centered system design can transform public sector services into improved, outcomes-driven models. As expectations around cost reduction and efficiencies continue to drive change, government and industry leaders must go beyond incremental improvements to reshape how citizen experiences are designed and in fact delivered. This webinar will explore how focusing on mission outcomes can pr...
July 8, 2025
Organizer:
FedInsider Location:
Webcast
Mobile Security: The Human Layer is the...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer:
FedInsider Location:
Webcast
Mobile Security Series: Securing the Hu...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer:
FedInsider Location:
Webcast
Talking Tech: Simplifying STIG Complian...
The U.S. Department of Defense uses security standards that are set forth in its Security Technical Implementation Guide (STIG) to help protect its systems and networks. By implementing unified automation, which integrates automated tools with the STIG standards, DoD can improve system-level control compliance throughout the software lifecycle. From reduced timelines and improved reliability to sustainable ATO processes, unified STIG automatio...
June 26, 2025
Organizer:
FedInsider Location:
Webcast
The Strategy Behind Meeting CMMC Requirements
The purpose of the Cybersecurity Maturity Model Certification is to have in place the security and privacy controls that give information systems greater resilience in the face of a wide range of dangers, including malicious attacks, natural disasters, structural shortcomings, human error, and hostile nation-state surveillance. The catalog of controls is laid out in the National Institute of Standards and Technology Special Publication 800-53...
June 24, 2025
Organizer:
FedInsider Location:
Webcast
AI Branches Out into New Solutions
Since the launch of ChatGPT in late 2022, artificial intelligence has rapidly evolved into multiple specialized and mission-focused tools. Generative AI, multimodal AI, and agentic AI are no longer just concepts—they’re transforming how agencies approach everything from data analysis to decision support. Each branch brings unique capabilities and challenges. Generative AI helps automate content creation, multimodal AI enables riche...
June 18, 2025
Organizer:
FedInsider Location:
Webcast
The Path to Modernization and Productiv...
The introduction of cloud has remade the government IT landscape. In the early days of government adoption, cloud was seen as a cost-saving measure as agencies were encouraged to move their on-premises data centers to the cloud, reducing dependence on legacy storage and real estate expenses. But as the technology has evolved and agencies have adopted more cloud solutions, it has become clear that it can provide a better experience for employee...
June 12, 2025
Organizer:
FEDINSIDER Location:
Webcast
Humans + AI = Prioritizing Higher Value Work
The federal government has been incorporating new technologies into its operations for decades, looking to streamline processes and add functionality. The introduction of artificial intelligence (AI) into the government IT ecosystem is not, by itself, something new, but employees are not yet clear on how AI will make their work better. The World Economic Forum recently suggested that “AI’s real power lies in reimagining workflows a...
June 10, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.