Remove Integrity Remove Networking Remove Webinar
article thumbnail

5G: The Transformation of Defense Networks

FedInsider

Friday, October 13, 2023 | 2:00PM EDT | 1 Hour | 1 CPE In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. and its allies and partners.

article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including cybersecurity tools, integration services, and dashboards that help participating agencies improve their security posture.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

State & Local Government: Ohio Pursues Integrated Customer Services, Securely

FedInsider

CPE The state of Ohio is pursuing an integrated customer approach that improves the user experience, such as creating a digital identity to simplify interactions with agencies while keeping information private and secure. Friday, September 6, 2024 | 2:00PM EDT | 90 Minutes | 1.5 Certificates will be e-mailed to registrants.

article thumbnail

Election Security: Protecting the Foundation of Democracy – Infrastructure Integrity

FedInsider

Thursday, May 9, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Infrastructure Integrity – Ensuring Resilient Systems Administering elections falls on the shoulders of state and territorial governments. It is not surprising, then, that there are so many different approaches, technologies, and processes in place to handle election infrastructure.

article thumbnail

IT Disaster Recovery – It’s More Than Rebooting Servers

FedInsider

Monday, September 16, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Federal agencies’ systems are targeted by hostile interests all the time, whether it’s through a vulnerability in their networks or through a third-party product. Certificates will be e-mailed to registrants.

IT 105
article thumbnail

Creating a Zero Trust Ecosystem

FedInsider

The pillars include continuous authentication; comply-to-connect, device detection and compliance; continuous monitoring and ongoing authorization; data encryption and rights management; software-defined networking; policy decision point and policy orchestration; and threat intelligence. Certificates will be e-mailed to registrants.

article thumbnail

The Future of 5G Technology in Government

FedInsider

To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. enterprise, non-terrestrial network and public sector customers. Certificates will be e-mailed to registrants.