Back to Search Begin New Search Save Search Auto-Notify
CyberSmart 2025: From A to Z
The cyber world is becoming increasingly complex as new technologies, policies and expectations come into play. Artificial intelligence (AI) is making inroads into applications, network management, and more, while identity management and zero trust architectures are altering the threat landscape. Agencies are embracing the many varied cloud deployments, such as multi-cloud, hybrid, private, etc. All new technologies introduce new elements of r...
May 2, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Cost-Efficient IT Modernization for Sta...
State, local, territorial, and tribal governments in 2025 are navigating a complex landscape of tight budgets, evolving cyber threats, ambitious digital transformation goals, and increased demands for transparency – all while being expected to deliver high-quality citizen services. Central to addressing all these challenges is the reliability and performance of agencies’ IT infrastructure. Without a resilient and observable foundat...
May 13, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
OT is Not IT
Operational technology (OT) is comprised of the systems and devices used to control and monitor physical processes, often in industrial or critical infrastructure environments and utilizing OEM-proprietary equipment. OT systems are designed to manage machinery, equipment, and processes, ensuring they operate effectively and safely, distinct from IT, which focuses on data processing and information management and uses near-universal standards....
May 14, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Harnessing AI & ML for Smarter Cybersecurity
As cyber threats grow more sophisticated, agencies must move beyond static defenses to intelligence-driven security. And while AI and machine learning (ML) enhance efficiency by detecting anomalies, forecasting risks, and accelerating response, agencies still need to address concerns about verification of alert evidence and suggested response actions. AI-powered security integrates with existing tools like Security Information and Event Manage...
May 15, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Cybersecurity: Building Resiliency, Red...
Join us as thought leaders from government and industry share how they are managing the cyber defenses of some of our nation’s critical agencies. Government agencies need to strengthen cybersecurity defenses while reducing cost and eliminating unnecessary applications. Agencies seek to gain complete visibility and consolidation of data across multiple sources, both to strengthen their security posture and become more efficient through ap...
May 16, 2025
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
State of the States
States, counties, municipalities, territories, and tribal governments have many interactions with their residents every year, addressing many facets of everyday life – from schools to roads, water and sewer services to business licensing. The National Association of State CIOs (NASCIO) identified the top 10 priorities of its members for 2025. While strengthening cybersecurity and risk management continues as the top priority, state CIOs...
May 20, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberThreats 2025 - Beyond Zero Trust -...
The federal government has invested almost four years to move all its systems and networks to a least permissive access architecture, based on the concept of “never trust, always verify.” This has significantly improved cybersecurity, but it’s a moving target – bad actors, whether cyber criminals or hostile nation-states, keep evolving their tools and tactics, seeking new vectors they can penetrate. To constantly improv...
May 28, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberThreats 2025 - Federal, State ...
The federal government has invested almost four years to move all its systems and networks to a zero trust (ZT) architecture, based on the concept of “never trust, always verify.” State and local, territorial, and tribal governments are not bound by the federal agency mandate to implement ZTarchitectures, but there are numerous reasons they are either considering it or taking action to put it in place. This has significantly improv...
May 28-29, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberThreats 2025 - State & Local Requi...
State and local, territorial, and tribal governments are not bound by the federal agency mandate to implement zero trust architectures, but there are numerous reasons they are either considering it or taking action to put it in place. Zero trust is a particularly important concept for these smaller government bodies because they own and operate critical infrastructure and provide vital day-to-day services to their residents, from issuing drive...
May 29, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search