Disparate, But Secure: The Possibility...
Zoom bombs, fishy texts, demanding emails: COVID-19 has revealed the capabilities and infrastructure not yet in place to support a fully remote state and local government workforce. This webcast will explore how federal, state and local officials have leveraged budgets, policies, and personnel to respond quickly to cybersecurity threats during the massive shift to working from home. We’ll investigate what it’ll take to put the rans...
Testing Government's Connection: Work f...
The federal government is operating in a way it's never done before: almost entirely remotely. Missions, priorities, schedules, wages, benefits, technology, tools, and locations are changing, and will continue to change. How are government workers and managers handling this shift in creative, productive ways? And, how will the current work-from-home directive push the government to rethink responsibilities and adjust resources accordingly? Th...
Genius Machines: Purchasing with the Po...
Artificial intelligence uses continue expanding throughout the federal government, and applying the technologies to the opaque federal acquisition process is no exception. With the potential to save billions of dollars and work hours annually, AI is streamlining contracting in the notoriously time-consuming process and creating opportunities to invest in innovative—not just familiar—ideas. In this digital event, Nextgov and Defens...
Powering Mission Readiness: Mitigating...
CISA, ODNI and the DOD are working together to promote the magnitude of supply chain security and risk management. Breaches in the supply chain create an opportunity for malicious software or hardware to be installed on equipment. Lack of awareness or validation of the legitimacy of hardware and software presents a serious threat to users’ information and the overall integrity of a network environment.
Securing the Government Cloud
As federal agencies continue to modernize their technological infrastructure, securing the cloud remains a priority. Across government, innovative approaches and standards to cloud computing continue to develop, including the upcoming release of the Department of Homeland Security’s Trusted Internet Connection guidance (TIC 3.0), forthcoming FedRAMP automation, and, of course, the looming JEDI transition in the Department of Defense, to...
The Next Big Network
As many federal agencies move away from on-premise networks, they are often plunged straight into the exciting, but intimidating, world of future network architectures. This information technology transformation allows government to achieve mission success with more agility as well as analyze the increasing amounts of data. It is important that any agency's modernization roadmap considers how their network can handle the Internet of Things and...
Seamless CX
In times of tumult, citizens and public servants alike find themselves turning to the government for guidance, leadership and services. But even during relative normalcy, daily government communications and operations require innovative thinking to provide public experiences to rival those in the private sector, not to mention the additional layer of creating agencies’ own frictionless internal experiences. In this digital event, hear fr...
Powering Mission Readiness: National Se...
America’s intelligence collectors are already using AI in ways big and small, to scan the news for dangerous developments, send alerts to ships about rapidly changing conditions, and speed up the NSA’s regulatory compliance efforts. But before the IC can use AI to its full potential, it must be hardened against attack. The humans who use it — analysts, policy-makers and leaders — must better understand how advanced AI...
CyberSmart Series: Denver
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. As many vital government services and data move online, the protection of government information and infrastructure from looming cyber-attacks is more important than ever before. Initiatives across Colorado, such as READYColorado and the National Cybersecurity Center, show that the best fortification strategy is developing a robust...
March 31, 2020
Organizer:
Route Fifty Location:
Virtual
Genius Machines: The Future of Intellig...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. That means channeling artificial intelligence, machine learning and other emerging technologies to aid the special operations community when it comes to gathering and analyzing intelligence, enhancing cyber operations and transforming tools for soldiers. Tune in to the digital edition of Genius Mac...
December 10, 2019
Organizer:
Defense One Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.