Remove Integrity Remove Project Management Remove Webinar
article thumbnail

Protecting the 2024 Election: Be Prepared for Anything

FedInsider

The threat of mis-, dis-, and mal-information (MDM) that aims to undermine the public’s confidence in election integrity is another concern. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

This requires understanding what tools are already available, their features and functionalities, how widely deployed they are, and how different tools can be integrated to achieve priorities such as adopting identity-driven access, incorporating the principle of least privilege, and reducing an agency’s threat surface.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

O-RAN – the Next Step for 5G

FedInsider

military forces and their partners can use in conflicts to integrating 5G capabilities to create “smart” warehouses to significant improvements in supply chain logistics, DoD has been committed to investing in rethinking the meaning and applications of communications. From creating secure private networks that U.S.

article thumbnail

Cyber Attacks are Just as Damaging as Natural Disasters

FedInsider

To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Southern Command (Feb 2000 – April 2003) Chief, Department of Defense Intelligence Information Systems (DoDIIS), System Integration Management Office, U.S.

article thumbnail

Using Security Intelligence to Protect Healthcare IT

FedInsider

CPE credit in Business Management & Organization.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.

IT 52
article thumbnail

Using Data to Fortify Network Defenses

FedInsider

The program has evolved over the past decade to add new capabilities, including cybersecurity tools, integration services, and dashboards that help participating agencies improve their security posture. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems.

article thumbnail

Applying AI to Advance Agency Missions

FedInsider

To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Singh is passionate about process and project management. The critical thread across roles is Program, Process and Project Management.