Quantum Speaker Series Presents: Scaling Quantum Computers Using Light

Virtual

Once fully realized, quantum computers will solve problems we never thought possible. Building a quantum computer with enough power to solve these problems is one of this decade’s biggest technological challenges. Xanadu is taking on this challenge in its mission to build quantum computers that are useful and available to people everywhere. Xanadu Founder and CEO Christian Weedbrook talks about his quantum computing journey and outlines Xanadu’s roadmap to 1 million qubits using light.

Open Q&A

Challenges and Approaches: Improving Federal IT Audit Readiness and Outcomes

Virtual

Federal agencies have to undergo independent audits to demonstrate compliance with Federal IT audit controls from guidelines such as Federal Information System Controls Audit Manual (FISCAM), Federal Information Security Modernization Act (FISMA), Statement on Standards for Attestation Engagements (SSAE), Financial Improvement and Readiness Guidance (FIAR), National Institute of Standards and Technology (NIST) guidance, as well as other Federal audits and general Federal IT Controls. Agencies often struggle to achieve a state of readiness for these audits in terms of minimizing IT findings, improving FIAR compliance, and gaining an understanding of options for remediation of IT findings resulting from the audit.

This webinar discussion will explore the major challenges that they face in improving their level of readiness for such audits and strategies that have improved their operational posture for these audits to minimize the findings and resulting corrective actions.

The Fundamentals of Protecting your Paths to Privilege

Virtual

Despite the long standing principles of Least-Privilege and Privilege Access Management (PAM), 90% of organizations experienced at least one identity-related security incident in the past year. Even with the number of security tools in place, attackers are outflanking them through unidentified attack paths. And AI is accelerating and uncovering paths to privilege faster than we’ve ever seen. In this webinar, our panelists will discuss how many organizations still maintain legacy identity platforms and applications, the types of privilege abuse that can (and does) occur and finally the fundamentals for protecting your paths to privilege and why it requires an identity-centric approach.

ATARC’s Federal Health IT Summit

Carahsoft Conference & Collaboration Center 11493 Sunset Hills Rd, Reston, VA, United States

6.0 CPE Credits Available for this Event***Registration   |    Breakfast Opening Keynote BriefingBridging the Gap: Advancing Diversity and Mental Health Equity As diversity and inclusion become essential to driving innovation, […]

USDA Stratus Launch Event

USDA 1400 Independence Ave SW #5071, Washington, DC 20250, United States

6.0 CPE Credits Available for this Event*** A forum for the USDA, our Federal partners, and Industry to collaborate and build thefuture of Cloud through the STRATUS Program.STRATUS was conceived […]

Advancing the Mission: AI in Government Summit

AWS Aurora 1770 Crystal Drive, Arlington,, VA, United States

   Registration   |    BreakfastKeynote BriefingRAG (Retrieval Augmented Generation) and its ApplicationsGen AI as a Tool for Mission EnablementEnsuring effective mission enablement through Generative AI is crucial in today's fast-evolving […]

Assessing the Benefits and Risks of Quantum Computers

Virtual

Quantum computing is an emerging technology with potentially far-reaching implications for national prosperity and security. The maturity of currently-available quantum computers is not yet at a level such that they can be used in production for large-scale, industrially-relevant problems, and they are not believed to currently pose security risks. However, four trends — new algorithms, error mitigation, circuit knitting, and the commercial exploration of business-relevant quantum applications — may enable useful and practical quantum computing in the near future. At the same time, these trends are unlikely to affect the feasibility of using quantum computers for cryptanalysis. Given this, there is a credible expectation that quantum computers will be capable of performing computations which are economically-impactful before they will be capable of performing ones which are cryptographically-relevant.