Back to Search Begin New Search Save Search Auto-Notify
Revolutionizing Federal IT: The Power o...
Federal leaders feel immense pressure to modernize legacy applications to improve user experiences and accelerate mission outcomes. As Americans’ expectations of government services continues to grow, harnessing generative AI (GenAI) provides leaders with opportunities to improve delivery through streamlined software development, enhanced workforce efficiency, and strategic decision-making. Harnessing AI is a useful way to advance modern...
January 29, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Data Modeling for State & Local Governments
If a picture is worth a thousand words, turning data into graphical images that show relationships must be just as valuable. Agencies across the country, looking for ways to better leverage the value of the data they already gather, are wrestling with how to implement data modeling to make use of the information. There are four key areas where data modeling tools provide value: Data governance and compliance is easier when a data modeling tool...
January 23, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Cyber Resilience for the Defense ...
Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. By understanding the data—its location, accessibility, and how to res...
January 22, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Cloud Native Application Security - Lif...
Agencies have invested heavily in migrating applications to the cloud and creating cloud-native applications to serve the public. Securing these applications has emerged as a primary objective, particularly in incorporating them into a zero trust architecture. Strengthening app security focuses on integrating security measures throughout the application lifecycle – from development to deployment – by using cloud-native technologies...
January 14, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberThreats 2024: Combatting the Evolv...
The means and methods of launching cyber attacks against government agencies and critical infrastructure industries at all levels continue to proliferate rapidly. From cyber attacks on water and wastewater treatment systems to ransomware targeting hospitals and physicians’ practices, phishing attacks to straightforward fraud, state and local agencies, educational institutions, and tribal and territorial governments often find themselves...
December 19, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberThreats 2024: Combatting The Evolv...
The means and methods of launching cyber attacks against government agencies and critical infrastructure industries at all levels continue to proliferate rapidly. The U.S. government is responsible for attending to our national interests, from federal safety nets such as environmental protection and Social Security to national defense and protection against hostile foreign actors, whether individuals, terrorist groups or nation-states. Hundred...
December 18, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
How to Better Manage Talent Recruitment...
The biggest challenge federal government stakeholders currently face is managing their workforce effectively across myriad sites, including fully remote work, hybrid work and multiple office locations. Caught between a competitive job market and a dearth of talent, leaders must think through the psychology of return-to-work policies and consider theexperience for their employees. A February 2024 memo from the Office of Personnel Management con...
December 17, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Cyber Leaders Modernizing The CDM Program
2024 has been, sadly, a banner year for cyber attacks against both government and private sector organizations. On Nov. 29, for instance, the Veterans Administration announced it suffered a breached that exposed hundreds of former service member’s medical information. and On Nov. 13, for instance, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint statement that the Chinese government (PRC) has been...
December 16, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Dynamic Security: Central to Achieving...
In an era where remote access and edge computing have become common, the idea of a security perimeter is out of date and ineffective. This is part of the push to move government IT systems to a Zero Trust architecture – every user and every interaction must be verified every time. This also means that cybersecurity must be dynamic, able to respond instantly to threats and able to pivot as new risks emerge. To meet the need, security has...
December 12, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Health IT In Depth: Applying Technology...
The federal government is pursuing transformative advancements in healthcare IT. Most notable is the implementation of a single, unified electronic health record (EHR) system that connects multiple federal agencies, including the Department of Defense, VA, and Coast Guard. This system enables real-time data sharing across departments, streamlining care coordination and improving efficiency for millions of patients. Agencies can point to both c...
December 11, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search