• Follow
  • Follow
  • Follow
  • Follow
  • Home
  • Events
    • All Events
    • Fed Tech Priorities Summit (February 18)
    • Public Sector Health IT Summit (February 19)
    • Public Sector Zero Trust Summit (February 26)
    • Workforce Modernization Summit (March 19)
    • Cloud Security Summit (April 16)
  • GITEC 2026
    • GITEC 2026 (May 3-5)
    • GITEC 2026 Awards Nomination Form
    • GITEC Board
  • Working Groups
    • Agentic AI
    • Continual Authorization to Operate (cATO)
    • Cyber-AI Convergence
    • Cybersecurity Education
    • DevSecOps
    • Fraud Detection
    • Golden Dome Innovation
    • Global Quantum
    • Identity Management
    • Insider Risk
    • SCRM
    • Threat Intelligence
    • Zero Trust
  • Corporate Membership
  • Podcasts
  • Labs
    • ATARC Zero Trust Lab: Phase 3
    • ATARC Zero Trust Lab: Phase 2
    • ATARC Zero Trust Lab: Phase 1
  • Archives
    • Whitepapers
    • Past Webinars
    • Past Summits
    • GITEC 2025
      • GITEC 2025: Conference
      • GITEC Award Winners: 2025
  • About
    • About ATARC
    • ATARC Staff
    • GITEC Board
    • Partner with ATARC
    • Contact

Developing Supply Chain Risk Management (SCRM) Initiatives in the Federal Government

Oct 3, 2023

Developing Supply Chain Risk Management (SCRM) Initiatives in the Federal Government SCRM Working Group | September 2023 Supply Chain Risk Management (SCRM) plays a crucial role in safeguarding the integrity and security of supply chains within the Federal government....

Considerations for Secure and Resilient Private 5G

Sep 11, 2023

Considerations for Secure and Resilient Private 5G ATARC Secure 5G Working Group | September 2023 Download the White Paper...

Reducing Cyber Attack Risks Within Software Development Lifecycle Management

Sep 11, 2023

Reducing Cyber Attack Risks Within Software Development Lifecycle Management ATARC Software Factory Working Group   |    September 2023 Download White Paper...

Intermediate Cybersecurity Best Practices: Advancing Cybersecurity Posture Through Zero Trust Architecture

Jun 27, 2023

Intermediate Cybersecurity Best Practices Advancing Cybersecurity Posture Through Zero Trust Architecture ATARC State and Local Cyber Grants Working Group | June 2023 View Guidance Document Here This serves as ATARC’s State and Local Cyber Grants Working Group’s...

Baseline Cybersecurity Best Practices: An Overview for Success in Applying for the State and Local Cybersecurity Program

Apr 3, 2023

Baseline Cybersecurity Best Practices: An Overview for Success in Applying for the State and Local Cybersecurity Program ATARC State and Local Cyber Grants Working Group | March 2023 View Guidance Document Here The integrity of an organization’s information...
« Older Entries
Next Entries »

The safety of your personal information is very important to us.
For further information, please review our complete Privacy Policy

  • Home
  • Sitemap
  • Contact
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Preferences
  • {title}
  • {title}
  • {title}
Gated Content Test Download