Remove Networking Remove Risk Management Remove Webinar
article thumbnail

Bringing Automation to Cloud Risk Management

FedInsider

.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.

article thumbnail

Strengthening Your Network Security: Balancing Outer & Inner Defenses (E123)

FedInsider

In the technology world, the term “segmentation” applied to network topology. Networks, after all, have been segmented since the days when subnets were devised in the early 80’s. To view this webinar: Strengthening Your Network Security: Balancing Outer and Inner Defenses. Tune in on your favorite Podcasting Platforms.

Balance 104
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Data to Fortify Network Defense (E151)

FedInsider

To view this webinar: How to Fight Threats to the Software Supply Chain. As DCISO, Nate assists in the development, implementation, and oversight of comprehensive information security strategies, risk management, agency incident response plans, and programs. Immigration and Customs Enforcement. Department of Defense.

article thumbnail

Government Strategies & Investment for AI

FedInsider

CPE As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. Thursday, August 1, 2024 | 2:00PM EDT | 90 Minutes | 1.5

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Thursday, October 19, 2023 | 2:00PM EDT | 1 Hour | 1 CPE The central premise of Office of Management and Budget Memo 22-09 laying out the Federal Zero Trust Strategy is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Controlling access is everything. Army War College.

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.

article thumbnail

Building Responsible AI Workflows with AI Governance

FedInsider

Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes governing use of AI, including a requirement that every agency appoint a Chief AI Officer (CAIO) before June 1. Certificates will be e-mailed to registrants.