Insider Risk Working Group

Virtual

Join ATARC's Insider Risk Working Group bi-weekly, Thursday afternoon meeting. For more information on ATARC Working Groups, contact ATARC's Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.

Cloud Safe Task Force: Delivering the National Cyber Feed

Virtual

Event OverviewThe Cloud Safe Task Force (CSTF) recommends establishing a National Cyber Feed (NCF) —a public-private collaborative effort for comprehensive situational awareness of cyber threatsand responses, fed by real-time security […]

Future of Secure Work Working Group

Virtual

Join ATARC’s Future of Secure Work Working Group bi-weekly, Wednesday afternoon meeting. For more information on ATARC Working Groups, contact our Working Group Team at workinggroups@atarc.org.

Quantum Speaker Series PQC Roadmap

Virtual

Christian Lowry and Dr. Garfield Jones from CISA will discuss the risks and strategic technologies related to post-quantum cryptography and critical infrastructure. Engage in an open Q&A session to delve into emerging technological threats and protective measures. Register now to secure your spot and gain insights into the future of cybersecurity.

Insider Risk Working Group

Virtual

Join ATARC's Insider Risk Working Group bi-weekly, Thursday afternoon meeting. For more information on ATARC Working Groups, contact ATARC's Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.

Beyond Traditional Boundaries: Modernizing PIV/CAC Authentication

Virtual

In this webinar, panelists will describe their agency’s progress and challenges in leveraging PIV/CAC and the PKI credentials embedded within as the primary identity authentication mechanism for federal enterprise users. They will discuss the trend of agencies implementing additional (often weaker) authentication techniques to support a variety of use cases that PIV/CAC do not readily support. They will also discuss their agency vision with respect to leveraging FIDO2 credentials, and specifically, Derived FIDO2 Credentials to address multiple authentication use cases and the benefits and challenges of such implementations.