Back to Search Begin New Search Save Search Auto-Notify
Disparate, But Secure: The Possibility...
Zoom bombs, fishy texts, demanding emails: COVID-19 has revealed the capabilities and infrastructure not yet in place to support a fully remote state and local government workforce. This webcast will explore how federal, state and local officials have leveraged budgets, policies, and personnel to respond quickly to cybersecurity threats during the massive shift to working from home. We’ll investigate what it’ll take to put the rans...
June 8, 2020
Organizer: Nextgov and Route Fifty
Location: Webcast
Add Favorite
Testing Government's Connection: Work f...
The federal government is operating in a way it's never done before: almost entirely remotely. Missions, priorities, schedules, wages, benefits, technology, tools, and locations are changing, and will continue to change. How are government workers and managers handling this shift in creative, productive ways? And, how will the current work-from-home directive push the government to rethink responsibilities and adjust resources accordingly? Th...
June 4, 2020
Organizer: Government Executive
Location: Virtual
Add Favorite
Genius Machines: Purchasing with the Po...
Artificial intelligence uses continue expanding throughout the federal government, and applying the technologies to the opaque federal acquisition process is no exception. With the potential to save billions of dollars and work hours annually, AI is streamlining contracting in the notoriously time-consuming process and creating opportunities to invest in innovative—not just familiar—ideas. In this digital event, Nextgov and Defens...
June 3, 2020
Organizer: Defense One and Nextgov
Location: Webcast
Add Favorite
Powering Mission Readiness: Mitigating...
CISA, ODNI and the DOD are working together to promote the magnitude of supply chain security and risk management. Breaches in the supply chain create an opportunity for malicious software or hardware to be installed on equipment. Lack of awareness or validation of the legitimacy of hardware and software presents a serious threat to users’ information and the overall integrity of a network environment.
May 19, 2020
Organizer: Defense One and Nextgov
Location: Webcast
Add Favorite
Securing the Government Cloud
As federal agencies continue to modernize their technological infrastructure, securing the cloud remains a priority. Across government, innovative approaches and standards to cloud computing continue to develop, including the upcoming release of the Department of Homeland Security’s Trusted Internet Connection guidance (TIC 3.0), forthcoming FedRAMP automation, and, of course, the looming JEDI transition in the Department of Defense, to...
May 12, 2020
Organizer: Defense One
Location: Webcast
Add Favorite
The Next Big Network
As many federal agencies move away from on-premise networks, they are often plunged straight into the exciting, but intimidating, world of future network architectures. This information technology transformation allows government to achieve mission success with more agility as well as analyze the increasing amounts of data. It is important that any agency's modernization roadmap considers how their network can handle the Internet of Things and...
May 12, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Seamless CX
In times of tumult, citizens and public servants alike find themselves turning to the government for guidance, leadership and services. But even during relative normalcy, daily government communications and operations require innovative thinking to provide public experiences to rival those in the private sector, not to mention the additional layer of creating agencies’ own frictionless internal experiences. In this digital event, hear fr...
April 29, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Powering Mission Readiness: National Se...
America’s intelligence collectors are already using AI in ways big and small, to scan the news for dangerous developments, send alerts to ships about rapidly changing conditions, and speed up the NSA’s regulatory compliance efforts. But before the IC can use AI to its full potential, it must be hardened against attack. The humans who use it — analysts, policy-makers and leaders — must better understand how advanced AI...
April 27, 2020
Organizer: Defense One and Nextgov
Location: Webcast
Add Favorite
CyberSmart Series: Denver
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. As many vital government services and data move online, the protection of government information and infrastructure from looming cyber-attacks is more important than ever before. Initiatives across Colorado, such as READYColorado and the National Cybersecurity Center, show that the best fortification strategy is developing a robust...
March 31, 2020
Organizer: Route Fifty
Location: Virtual
Add Favorite
Genius Machines: The Future of Intellig...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. That means channeling artificial intelligence, machine learning and other emerging technologies to aid the special operations community when it comes to gathering and analyzing intelligence, enhancing cyber operations and transforming tools for soldiers. Tune in to the digital edition of Genius Mac...
December 10, 2019
Organizer: Defense One
Location: Webcast
Add Favorite
Back to Search Begin New Search