Remove Leadership Remove Networking Remove Webinar
article thumbnail

Transforming Public Sector Leadership with Data-Driven Decisions

FedInsider

.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.

article thumbnail

Data-Driven Decisions Can Transform Public Sector Leadership

FedInsider

.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Data to Fortify Network Defenses

FedInsider

Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.

article thumbnail

5G: The Transformation of Defense Networks

FedInsider

Friday, October 13, 2023 | 2:00PM EDT | 1 Hour | 1 CPE In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. and its allies and partners.

article thumbnail

Strengthening Your Network Security: Balancing Outer & Inner Defenses (E123)

FedInsider

In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Tune in on your favorite Podcasting Platforms.

Balance 104
article thumbnail

Creating a Zero Trust Ecosystem

FedInsider

The pillars include continuous authentication; comply-to-connect, device detection and compliance; continuous monitoring and ongoing authorization; data encryption and rights management; software-defined networking; policy decision point and policy orchestration; and threat intelligence. Certificates will be e-mailed to registrants.

article thumbnail

Using Data to Fortify Network Defense (E151)

FedInsider

To view this webinar: How to Fight Threats to the Software Supply Chain. Nate Fontaine’s exceptional contributions to education, local and federal government, and community service embody the values of leadership, service, and honor. He is a recipient of the prestigious Fed 100 Award, recognizing his leadership at that agency.