FISMA Mobility Metrics Working Group Meeting

Virtual

Join ATARC's FISMA Working Group bi-weekly, Friday morning meeting. For more information on ATARC's Working Groups contact ATARC's Working Group Manager, Kiersten Patton, and kpatton@atarc.org.

Intelligent Data: The Key to Cyber Resilience

Virtual

Tune into this webinar to hear Federal IT experts explore strategies to leverage intelligent data to fortify your defenses, manage risks, control costs, and ensure readiness aligned with your mission. In the dynamic digital landscape, adaptability and flexibility are paramount in effectively addressing evolving cyber threats.

ATARC Quantum Speaker Series: Dr. Venkatesh Kannan

Virtual

This talk will outline user-centric motivations and requirements that drive the development of technologies for full-stack interfacing and integration of quantum computing platforms with HPC systems from hardware, software to applications and skills. European activities driven through the EuroHPC Joint Undertaking as well as global activities such as the IEEE Quantum-HPC Working Group will be presented alongside the technological challenges and R&D collaborations that are ongoing.

Dod Zero Trust Symposium Credits

Virtual

Submit your request for the credits collected through the DoD Zero Trust Symposium from April 2-3, 2024!Please fill out the below form to request a CPE Certificate. ATARC will process the requests and email certificates within a week (dependent on initial volume of requests).    The questions below help verify your attendance in conjunction with […]

Insider Risk Working Group

Virtual

Join ATARC's Insider Risk Working Group bi-weekly, Thursday afternoon meeting. For more information on ATARC Working Groups, contact ATARC's Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.

Operationalizing Zero Trust: Securing Containers in Runtime

Virtual

  Presents Operationalizing Zero Trust:  Securing Containers in Runtime In partnership with April 4, 2024, 1:30-2:30 PM ET  1 CPE Credit Available for this Event***  Operationalizing Zero Trust:  Securing Containers in Runtime In the rapidly evolving landscape of cybersecurity, the Zero Trust model has emerged as a cornerstone principle, dictating that trust must never be implicit […]