Remove Networking Remove Risk Management Remove Webinar
article thumbnail

Bringing Automation to Cloud Risk Management

FedInsider

.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.

article thumbnail

Strengthening Your Network Security: Balancing Outer & Inner Defenses (E123)

FedInsider

In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Tune in on your favorite Podcasting Platforms.

Balance 104
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. Army War College.

article thumbnail

Accelerating Cloud Migration for Agencies

FedInsider

They address the critical cybersecurity challenges that risk management requires, including alignment with zero trust architectures that agencies are mandated to implement. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.

article thumbnail

Government Strategies & Investment for AI

FedInsider

CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5

article thumbnail

Emerging Technology Series: Cybersecurity

FedInsider

To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He oversees risk management and cybersecurity accountability for information systems, weapon systems and operational technology supporting military cyberspace operations.

article thumbnail

Using Data to Fortify Network Defense (E151)

FedInsider

To view this webinar: How to Fight Threats to the Software Supply Chain. As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, risk management, agency incident response plans, and programs. Immigration and Customs Enforcement. Department of Defense.