ATARC Zero Trust Phase 2 Demonstration with iboss and Resiliant

Virtual

Join our ATARC Zero Trust Lab Phase 2 Demonstration, co-hosted by iboss and Resiliant. This event showcases cutting-edge Zero Trust solutions, tailored to meet the sophisticated cybersecurity challenges outlined in the ATARC Phase 2 scenarios.

*Government only audience

Rise of the Machines! Zero Trust Considerations in an AI-Enabled Enterprise

To Be Announced

  Presents Rise of the Machines! Zero Trust Considerations in an AI-Enabled Enterprise In partnership with February 22nd, 2024, 1:30-2:30 PM ET  1 CPE Credit Available for this Event***  In today's world, we're constantly hearing about new tech terms and breakthroughs, from artificial intelligence (AI) to Zero Trust security. Government organizations are always trying to keep […]

Federal ICAM Day 2024

GSA HQ 1800 F Street NW, Washington, DC

February 26, 2024, 10 AM - 4 PM ET |GSA HQ, 1800 F St., NW, Washington, DC The GSA is co-sponsoring this event with ATARCWelcome & Opening RemarksGeneral Session  Presentation: Successes and Failures of Interoperability for Government Identity.Presentation: Friction of User Experience for the Citizen and the Employee. Presentation: Federation Barriers to Tackle and a Path […]

Integrated Value Network (IVN), An Introduction

Virtual

We will open with a brief recap on what is the Integrated Value Network (IVN) presented by the team, followed by panel questions and audience Q&A. We will close with a brief IVN demo.

Federal AI Summit 2024

Carahsoft Conference & Collaboration Center 11493 Sunset Hills Rd, Reston, VA, United States

Each agency’s journey and solution will be unique. With such a vast array of challenges and options, how can agencies get started? Join us as top Federal leaders discuss the steps they’ve taken to implement the AI guidance strategies and where they’re heading in 2024.

Strangeworks: Accelerating Innovation through Quantum Computing & AI

Virtual

This talk will focus on the powerful intersection of quantum computing, AI, and scientific exploration. We’ll begin with an overview of Strangeworks, an advanced compute software company removing the barriers to utilize quantum, quantum-inspired, and classical technologies. We’ll then discuss our recent work on quantum for solving optimization problems, and showcase our upcoming AI developments designed to make the capabilities of advanced compute more accessible.

Climbing the Mountain: A New Era for Government Cybersecurity

Virtual

In evolving Zero Trust strategies, government agencies often face unique challenges such as managing legacy systems that are not designed for such rigorous security protocol or adhering to regulatory and compliance standards. Despite these challenges, the benefits of moving towards a Zero Trust architecture are substantial. Tune into this webinar to hear topic experts discuss innovative solutions and strategic approaches to overcoming these obstacles. valuable insights into the latest trends and best practices in cybersecurity, specifically tailored to the needs and challenges of government agencies.

ATARC Federal Zero Trust Summit 2024

Marriott Marquis 901 Massachusetts Ave NW, Washington, DC, United States

By establishing a holistic understanding of network dynamics and user interactions, agencies can make informed decisions, assess risks, and optimize cybersecurity measures. In a landscape characterized by evolving threats and complex attack vectors, leveraging advanced analytics to support zero trust principles equips federal government entities with a robust defense mechanism that safeguards national security and preserves public trust in the digital realm.

Unlocking Cyber Readiness with SBOMs

Virtual

The cybersecurity landscape has undergone significant transformations resulting in compliance regulations mandating the adoption of the NIST Secure Software Development Framework framework, with a special emphasis on implementing a Software Bill of Materials (SBOM). In this discussion, we will explore the importance of perceiving cybersecurity as a mission-centric challenge that extends beyond mere compliance checklists.

Join us as we discuss key topics such as zero-day vulnerability management policies and continuous monitoring for all deployed software.