Cloud Safe Task Force: Delivering the National Cyber Feed

Virtual

Event OverviewThe Cloud Safe Task Force (CSTF) recommends establishing a National Cyber Feed (NCF) โ€”a public-private collaborative effort for comprehensive situational awareness of cyber threatsand responses, fed by real-time security […]

FISMA Mobility Metrics Working Group Meeting

Virtual

Join ATARC's FISMA Working Group bi-weekly, Friday morning meeting. For more information on ATARC's Working Groups contact ATARC's Working Group Manager, Kiersten Patton, and kpatton@atarc.org.

Quantum Speaker Series PQC Roadmap

Virtual

Christian Lowry and Dr. Garfield Jones from CISA will discuss the risks and strategic technologies related to post-quantum cryptography and critical infrastructure. Engage in an open Q&A session to delve into emerging technological threats and protective measures. Register now to secure your spot and gain insights into the future of cybersecurity.

Insider Risk Working Group

Virtual

Join ATARC's Insider Risk Working Group bi-weekly, Thursday afternoon meeting. For more information on ATARC Working Groups, contact ATARC's Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.

Growing Good in Government Working Group

Virtual

Join ATARCโ€™s Growing Good in Government Working Group bi-monthly, Thursday afternoon meeting. For more information on ATARC Working Groups, contact ATARCโ€™s Working Group Manager, Elizabeth Wyckoff, atย ewyckoff@atarc.org.

Beyond Traditional Boundaries: Modernizing PIV/CAC Authentication

Virtual

In this webinar, panelists will describe their agencyโ€™s progress and challenges in leveraging PIV/CAC and the PKI credentials embedded within as the primary identity authentication mechanism for federal enterprise users. They will discuss the trend of agencies implementing additional (often weaker) authentication techniques to support a variety of use cases that PIV/CAC do not readily support. They will also discuss their agency vision with respect to leveraging FIDO2 credentials, and specifically, Derived FIDO2 Credentials to address multiple authentication use cases and the benefits and challenges of such implementations.