DevSecOps Working Group Kick Off

Virtual

ATARC is hosting a roundtable on September 24th to kick off our upcoming DevSecOps working group! Implementing DevSecOps integrates security into every phase of the software development lifecycle, emphasizing the importance of cross-functional collaboration. Lessons learned from early adopters highlight the necessity of fostering a security-first mindset, investing in continuous education, and leveraging automated tools to streamline security practices.

Fraud Detection and Mitigation Working Group Kick Off

Virtual

ATARC’s Fraud Detection and Mitigation Working Group focuses on addressing fraud in government programs by leveraging technology to prevent identity-based, eligibility-based, and misuse-based fraud. With a proactive approach, the group aims to enhance data sharing, improve detection capabilities, and balance security with user experience. Join us for the official launch on January 30, 2025!

What’s Lurking in Your Phone: Navigating Security Risks in Mobile Apps

Virtual

Mobile apps, including the ones on your employees’ smartphones used for work, are a great source of sensitive data and are the newest, largest attack surface. Today’s mobile app ecosystem is riddled with potential security vulnerabilities, and as the evolution from Secure by Design to Secure by Demand suggests, it’s not enough to trust that software was securely developed. Organizations, especially government agencies, need to be proactive in preventing mobile app cyberattacks.

Join ATARC and a panel of experts where they will explore emerging mobile app threats, discuss security risks, and provide practical strategies to protect your organization from data breaches.

ATARC’s Federal Zero Trust Summit

Carahsoft Conference & Collaboration Center 11493 Sunset Hills Rd, Reston, VA, United States

Registration   |    Breakfast Summit ChairNavigating Cyber Threats: A Federal PerspectiveAmidst the ever-shifting digital terrain, federal agencies confront a multitude of cyber challenges, necessitating a proactive stance towards resilience. As […]

Quantum Speaker Series Presents: Scaling Quantum Computers Using Light

Virtual

Once fully realized, quantum computers will solve problems we never thought possible. Building a quantum computer with enough power to solve these problems is one of this decade’s biggest technological challenges. Xanadu is taking on this challenge in its mission to build quantum computers that are useful and available to people everywhere. Xanadu Founder and CEO Christian Weedbrook talks about his quantum computing journey and outlines Xanadu’s roadmap to 1 million qubits using light.

Open Q&A

Challenges and Approaches: Improving Federal IT Audit Readiness and Outcomes

Virtual

Federal agencies have to undergo independent audits to demonstrate compliance with Federal IT audit controls from guidelines such as Federal Information System Controls Audit Manual (FISCAM), Federal Information Security Modernization Act (FISMA), Statement on Standards for Attestation Engagements (SSAE), Financial Improvement and Readiness Guidance (FIAR), National Institute of Standards and Technology (NIST) guidance, as well as other Federal audits and general Federal IT Controls. Agencies often struggle to achieve a state of readiness for these audits in terms of minimizing IT findings, improving FIAR compliance, and gaining an understanding of options for remediation of IT findings resulting from the audit.

This webinar discussion will explore the major challenges that they face in improving their level of readiness for such audits and strategies that have improved their operational posture for these audits to minimize the findings and resulting corrective actions.

The Fundamentals of Protecting your Paths to Privilege

Virtual

Despite the long standing principles of Least-Privilege and Privilege Access Management (PAM), 90% of organizations experienced at least one identity-related security incident in the past year. Even with the number of security tools in place, attackers are outflanking them through unidentified attack paths. And AI is accelerating and uncovering paths to privilege faster than we’ve ever seen. In this webinar, our panelists will discuss how many organizations still maintain legacy identity platforms and applications, the types of privilege abuse that can (and does) occur and finally the fundamentals for protecting your paths to privilege and why it requires an identity-centric approach.

ATARC’s Federal Health IT Summit

Carahsoft Conference & Collaboration Center 11493 Sunset Hills Rd, Reston, VA, United States

6.0 CPE Credits Available for this Event***Registration   |    Breakfast Opening RemarksBridging the Gap: Advancing Diversity and Mental Health Equity As diversity and inclusion become essential to driving innovation, federal […]