This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
Data and AI-driven tools can increase visibility into, and lessons learned from hiring, onboarding, and turnover, but understanding the significance of those findings and their impact on the workforce and overall mission success is key to realizing the full potential of HR modernization. Certificates will be e-mailed to registrants.
Wednesday, April 3, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. Certificates will be e-mailed to registrants.
Despite being rich in data, many agencies are lagging in the data modernization needed to support AI – and combining incomplete or inaccurate data with AI can lead to hallucinations , ultimately placing mission delivery at stake. Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Previous roles include leadership positions at the MITRE Corporation, FEDDATA, and S2i2, Inc. Certificates will be e-mailed to registrants.
Tuesday, October 31, 2023 | 2:00PM EDT | 1 Hour | Training Certificate We all now live in a data-driven world. And the federal government may be the single largest generator – and user – of data in the world. Without a comprehensive data strategy, the legal and ethical challenges limit the potential of this emerging technology.
Tuesday, August 20, 2024 | 2:00PM EDT | 1 Hour | 1 CPE As agencies face unprecedented data volumes and velocity, managing the speed and size of the data flow efficiently becomes a significant challenge , especially with the growing use of AI-based analytics. Certificates will be e-mailed to registrants.
Tuesday, October 10, 2023 | 2:00PM EDT | 1 Hour | Training Certificate The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations.
Thursday, January 18, 2024 | 2:00PM EST | 1 Hour | Training Certificate State and local governments and education produce large amounts of unstructured data in a wide range of data types. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educational and government operations.
Alongside that comes understanding the location, nature, and sensitivity of the data within the agency. The two are complementary, since part of digital identity is restricting access to the data a user has the right to touch. Certificates will be e-mailed to registrants. & CIO, Dept.
Monday, September 30, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. The government’s Federal Data Strategy identifies the practices that lead to leveraging data to create value.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry discuss the absolutely critical role of data backup and recovery at a time when disasters are just as likely to happen – much less visibly – in cyberspace. Certificates will be e-mailed to registrants.
As Forbes describes it, “Traditional AI systems are primarily used to analyze data and make predictions, while generative AI goes a step further by creating new data similar to its training data.” What’s the difference? Certificates will be e-mailed to registrants. He has twice been awarded Jessie H.
CISAs new CDM Data Model Document(DMD) sets out the minimum set of data requirements needed to leverage the CDM solution to reduce every agencys threat surface, increase visibility into the federal cybersecurity posture, improve cybersecurity response capabilities, and streamline FISMA reporting. He has twice been awarded Jessie H.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Specializing in both application and infrastructure security, Stephen’s proficiency extends across on-premise data centers and cloud architectures.
Having a completed checklist can give agencies a sense of security, but with today’s explosion of data and potential attack from an unexpected vector, have they been falsely “lulled into complacency?” And avoiding data hoarding to prevent hidden attack codes. To view this webinar: The Hard Truths of Data Security in the Public Sector.
When the federal government adopts Zero Trust principles, it must consider both user identity and the data being accessed. To view this webinar: Zero Trust: Protecting Both Data and Identity. BigID enables organizations to know their enterprise data and take action for privacy, protection, and perspective.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Its ability to handle massive amounts of data makes it a crucial component in real-time data collection from all sources, including sensors, cameras, drones, cellphones, satellites, weapons systems, and devices that warfighters wear into combat. But 5G’s capabilities extend beyond creating private networks on the fly.
Thursday, September 12, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In 2023, 725 data breaches were reported to the Department of Health and Human Services, according to HIPAA Journal. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter – suddenly the systems had to become decentralized, distributed and open to remote workers. Certificates will be e-mailed to registrants.
Harnessing AI is a useful way to advance modernization goals, but AI governance—including ethical considerations, data security, and compliance with federal regulations—must remain a top priority. And increased AI implementation demand that organizations rethink how they staff, develop, and run their day-to-day operations. .”
Wednesday, June 26, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. Certificates will be e-mailed to registrants.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
With data generation being on the ever-constant increase, new solutions to protect it are needed to keep up with the challenge. In this week’s episode of Fed At the Edge, we sit down with a veteran in data protection, Aaron Lewis – Head of Public Sector Sales, Engineering for Rubrik. Not all data is the same. Has it been tested?
Years ago, Federal leaders would dream of getting terabytes of data; few thought we would have more computing power than trusted information. This week on Feds At the Edge, our discussion focuses on some of the risks in storing, sharing, and analyzing that data. What impact does generated data have? Share everything?
At the federal level, the Office of Management and Budget (OMB) issued a memo in March providing guidance for agencies to establish AI governance and risk management techniques while implementing innovative uses for their own organizations, including steps to enable sharing and reuse of AI models, code, and data.
Thursday, September 12, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In 2023, 725 data breaches were reported to the Department of Health and Human Services, according to HIPAA Journal. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
It’s likely to be the largest breach the sector has ever faced, disrupting billions in payments to doctors and hospitals, and potentially exposing the personal data of one-in-three Americans,” Modern Healthcare reported. This “cyberattack … paralyzed much of the US healthcare system. Certificates will be e-mailed to registrants.
It’s likely to be the largest breach the sector has ever faced, disrupting billions in payments to doctors and hospitals, and potentially exposing the personal data of one-in-three Americans,” Modern Healthcare reported. This “cyberattack … paralyzed much of the US healthcare system. Certificates will be e-mailed to registrants.
Mountains of data and Artificial intelligence are impacting every aspect of all federal agencies. This is the perfect example of how using data & AI will help all federal agencies in the three methods we explore: We’ll explore identity management on the large scale, advances made, and the challenge of digital credentials.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes.
We’ll ask if turning to “synthetic” data is the answer to generate insight on sensitive data while not compromising personal and identifiable information. To view this webinar: Unlocking Your Agency’s Data Treasure Trove with Large Language Models. Tune in on your favorite podcasting platform today.
To view this webinar: Generative AI in Government. He has over 20 years of technology consulting experience in the areas of data visualization, geospatial analytics, data management, and data science. In his role, Kyle builds teams that use data to create innovative solutions to difficult business challenges.
For instance, 5G networks must have state-of-the-art security and encryption, since they will be targets of cyber attacks, espionage and data breaches. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In this role he leads the business development and technical resources supporting Druid’s N.A.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations.
In cases where the readiness factor is used in a solicitation, companies will need to show how they meet National Institute of Standards and Technology cybersecurity controls for protecting a broad category of sensitive government data known as “controlled unclassified information” or “CUI.”
Andrew Manos, Director, Commercial Services for True Zero Technologies, suggests that, given today’s data volume, centralizing data is essential. To view this webinar: How to Fight Threats to the Software Supply Chain. He is a recipient of the prestigious Fed 100 Award, recognizing his leadership at that agency.
To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. She oversees work on emerging cybersecurity issues and federal agencies’ abilities to protect privacy, sensitive data, and the computing infrastructure. Tune in on your favorite Podcasting Platforms.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Jones brings valuable leadership, technical expertise, knowledge, and global experience to the position. Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He is the CEO of the Tech Writers Bureau, a group of professional journalists who craft thought leadership projects for government and private organizations.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content