ATARC Virtual Events

Industry Sponsorship

Integrated Value Network (IVN), More Examples

April 30, 2024, 1:30-2:30 PM ET

How might we implement the Integrated Value Network (IVN) framework in the wild? Our first challenge is to communicate what data is available and how it answers basic questions; we will do this by addressing key themes from the January kickoff survey. Hear from invited panelists as they discuss their use cases to address policy challenges using this “Moneyball” approach. We invite attendees to share their ideas and implementation of the framework. As time permits, the webinar will close with highlights from the April 2024 UMD Program Management Symposium.

Advanced Threat Protection for Government Infrastructure

In partnership with 

May 2, 2024, 1:30-2:30 PM ET

In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security solutions can effectively counter these threats, empowering agencies to proactively identify and prevent cyber disasters.

The 1st NIST PQC Standards

May 7, 2024, 1:30-2:00 PM ET

Eight years ago, the National Institute of Standards and Technology (NIST) initiated a public process to select quantum-resistant public-key cryptographic algorithms for standardization. NIST issued the public call for submissions to the PQC Standardization Process in December 2016 and, after three rounds of evaluation and analysis, selected four algorithms for standardization: CRYSTALS-KYBER, CRYSTALS-Dilithium, FALCON, and SPHINCS+. In this talk we will discuss the three current NIST PQC endeavors: drafting standards for the selected algorithms, the remaining algorithms under consideration in the 4th round of evaluation, and the call for additional digital signatures to be considered for future standardization.

 Securing the Identity Fabric in the Age of Cloud and Zero Trust

In partnership with

May 9, 2024, 1:30-2:30 PM ET

Securing government agencies against cyber threats is paramount in today’s digital age. This webinar introduces two FedRAMP High Authorized solutions, CyberArk Identity and Endpoint Privilege Manager (EPM), designed to meet and exceed rigorous government security standards. CyberArk Identity simplifies user access with features like Single Sign-On and Multi-Factor Authentication, enhancing security and compliance. Complementing this, EPM protects endpoints by managing user privileges and preventing credential theft, offering an added layer of defense against cyber attacks. This session will showcase how these integrated solutions fortify agency defenses and streamline operational efficiency. Join our panelists as they explore real-life applications of CyberArk’s tools in bolstering government cybersecurity postures and preparing agencies to tackle present and future digital challenges efficiently.

Past Virtual Events:

Securing Success: RMF and Zero Trust Unleashed

In partnership with

 

 

 

 

The reality is that cybercriminals are more sophisticated than ever before, meaning that the ability to defend, respond, and recover from a cyber event requires support across the organization. Neither IT nor security can cope alone. This panel will discuss the importance of resilience in today’s digital world and examine how to build a foundation for effective risk management throughout organizations.

Join ATARC and government and industry experts for a discussion about the strategies and technologies essential for protecting containerized applications against the unknown — specifically, zero-day exploits and active threats. Panelists discuss runtime controls, Zero Trust policies, and steps that can be taken to ensure that every component of your container ecosystem is continuously verified and secured.

Investigating the Needs, Opportunities and Challenges of Interfacing Quantum Computing with HPC

 

 

 

 

This talk outlines user-centric motivations and requirements that drive the development of technologies for full-stack interfacing and integration of quantum computing platforms with HPC systems from hardware, software to applications and skills. European activities driven through the EuroHPC Joint Undertaking as well as global activities such as the IEEE Quantum-HPC Working Group was presented alongside the technological challenges and R&D collaborations that are ongoing.

Intelligent Data: The Key to Cyber Resilience

In partnership with 

 

 

 

This session dove into thought leadership and best practices for leveraging intelligent data to fortify your defenses, manage risks, control costs, and ensure readiness aligned with your mission. Adaptability and flexibility are key in addressing evolving threats in the digital age.

Tune into this webinar to hear Federal IT experts explore strategies to leverage intelligent data to fortify your defenses, manage risks, control costs, and ensure readiness aligned with your mission. In the dynamic digital landscape, adaptability and flexibility are paramount in effectively addressing evolving cyber threats.

Unlocking Cyber Readiness with SBOMs

In partnership with   

 

 

 

The cybersecurity landscape has undergone significant transformations resulting in compliance regulations mandating the adoption of the NIST Secure Software Development Framework framework, with a special emphasis on implementing a Software Bill of Materials (SBOM). In this discussion, we will explore the importance of perceiving cybersecurity as a mission-centric challenge that extends beyond mere compliance checklists.

Join us as we discussed key topics such as zero-day vulnerability management policies and continuous monitoring for all deployed software.

The Use of Artificial Intelligence AI in Insider Risk Programs: Part II – Promise and Peril

 

 

 

Experts examine how AI supports Insider Risk programs in various sectors. They cover AI’s role in threat detection, showcasing positive outcomes and effective integration strategies into organizational cultures. Additionally, the webinar addresses common misconceptions about AI and provide guidance on building trust and transparency within organizations.

Climbing the Mountain: A New Era for Government Cybersecurity

In partnership with

 

 

Dive into the forefront of government cybersecurity by being a part of this conversation! Join industry experts and thought leaders explore the latest challenges and opportunities in safeguarding critical digital infrastructure. From emerging threats to innovative solutions, this event promises insightful discussions and practical strategies for enhancing cybersecurity resilience.

Strangeworks: Accelerating Innovation through Quantum Computing & AI

 

 

 

This talk focused on the powerful intersection of quantum computing, AI, and scientific exploration. We began with an overview of Strangeworks, an advanced compute software company removing the barriers to utilize quantum, quantum-inspired, and classical technologies. We then discussed our recent work on quantum for solving optimization problems, and showcase our upcoming AI developments designed to make the capabilities of advanced compute more accessible.

Integrated Value Network (IVN), An Introduction

 

 

 

Our session began with a quick recap of the Integrated Value Network (IVN) by our expert team, followed by a lively panel discussion exploring its applications and potential. Audience participation is encouraged through a brief Q&A, and we’ll wrap up with a captivating live demonstration showcasing the practical applications of the IVN in real-world scenarios. Join us for an engaging session that combines informative insights with interactive discussions and live demos, exploring the transformative possibilities of the IVN.

Rise of the Machines! Zero Trust Considerations in an AI-Enabled Enterprise

In partnership with

 

 

 

In today’s world, we’re constantly hearing about new tech terms and breakthroughs, from artificial intelligence (AI) to Zero Trust security. Government organizations are always trying to keep up, looking for quicker and smarter ways to get things done and keep their information safe. This webinar will talk about how the Zero Trust approach can help. Zero Trust means not taking safety for granted, no matter if someone is working inside or outside the company’s network. Panelists look into how adopting Zero Trust can make a secure foundation for using new tech now and in the future, helping businesses stay safe and ahead of the curve.

Report of Quantum Potential – The Responsible Adoption of Quantum Technologies

 

 

 

A presententation and overview of a report for the Canadian Council of Academies on what opportunities and challenges do quantum technologies present in light of current trends affecting their evolution? In particular, the focus will be on the following three questions: What does the current evidence and knowledge suggest regarding promising and leading practices that could be applied to drive and accelerate the adoption of quantum technologies? What are the enabling conditions to ensure broad access to and market readiness for quantum technologies? What are the main socio-economic, regulatory, and ethical challenges related to the adoption of quantum technologies? 

The Identity Catalyst: Accelerating Zero Trust with AI Innovations and your CDM Foundation

In partnership with 

 

 

 

A decade ago, the Continuous Diagnostics and Mitigation (CDM) Program put agencies on the right path with critical investments in identity and access automation, but technology hasn’t stood still. Today, the Federal Zero Trust Strategy aims to accelerate cyber maturity throughout the government and secure our nation’s future. At the same time, relentless innovation in Artificial Intelligence is changing the game for attackers and defenders alike.

This compelling discussion explores these top-of-mind topics: 1 ) How to advance your Zero Trust architecture atop an existing CDM foundation, 2) What AI innovations are empowering our nation’s cyber defenders, 3) Why modern Identity with AI is the catalyst for optimal Zero Trust maturity

Codeless Live Build Challenge

In partnership with.   

 

 

 

ATARC’s first virtual Live Build challenge! Teams will be tasked with building an innovative application in real-time using Unqork’s codeless development platform. Applications showcased how the government can leverage codeless development to rapidly drive impactful mission modernization.

Audience was shuffled through each team’s room as they build, with an opportunity to watch and ask questions. The Audience will return to the main room for a demo of each team’s solution.

*Videos to come*

2024 Vision: Elevating Federal Security with Cloud Tech

In partnership with 

 

 

 

The importance of implementing an intelligent cloud approach that not only enhances user intuitiveness but also significantly reduces the risk of breaches is crucial. Move beyond operational inefficiencies caused by fragmented solutions and discover how to streamline security measures across the entire application lifecycle. Breaking free from operational inefficiencies caused by fragmented solutions is at the forefront of public and private sector leaders as we enter the new year. Tune in to hear Federal topic leaders peer into the future of innovation within this AI-powered landscape and share insights on staying ahead of the curve. 

21st Century IDEA: Leveraging Modernization to Deliver a Digital-First Public Experience

In partnership with   

 

 

 

Join us in this conversation where we delved into the impactful initiatives supported by the Technology Modernization Fund (TMF). The TMF focuses on investing in cutting-edge projects in cybersecurity, data protection, interoperability, legacy system upgrades, and digital experiences. Discover how TMF plays a crucial role in implementing innovative information technology (IT) solutions across the government, enhancing agency processes, using taxpayer dollars more efficiently, and delivering straightforward, seamless, and secure experiences to the American public. Don’t miss the opportunity to explore the transformative potential of TMF-backed projects in shaping the future of government IT.

Mission Driven Observability: Enhancing Security, Compliance, and Efficiency

In partnership with  

 

 

 

Federal agencies need more support to implement modern monitoring tools that help improve their threat detection and response. But how can agencies achieve the resilience required for today’s cyber threats? It starts with prioritizing an observability strategy.

In this webinar, experts will discuss the importance of an observability strategy to improve SIEM performance and costs, optimize security information and event management, and how to comply with Federal Mandates including M-21-31.

Quantum Information Science at AFRL

 

 

 

This talk will summarize the AFRL Quantum Information Science program covering timing, sensing, networking and computing. Six of the nine AFRL tech directorates have active R&D programs in this strategically important area. Research timelines and operational impact will be discussed. Partnership opportunities through the Innovare Advancement Center will also be highlighted programs.

The Use of Artificial Intelligence (AI) in Insider Risk Programs

 

 

 

In this webinar, the ATARC Insider Risk Working Group will explore the use of AI in support of insider risk programs in Government, Industry, and Academia. Panel members will discuss the emergence of AI as a critical tool that has the power to enable and modernize insider risk programs. 

The panel will also discuss communicating AI, how to ensure programs do not become overly reliant on its use, and the guard rails necessary to control the use of AI in insider risk programs. The webinar will also explore several other AI-related topics ranging from the use of data, contextualizing products generated from AI, and reducing potential negative consequences of AI. This is the first of a multi-part webinar focused on AI in insider risk programs.

Quantum Leap: Space, Energy, and Collaborative Innovation

 

 

 

Discussing Artificial Brain’s current work with quantum annealing technologies, presenting benchmark results demonstrating quantum’s ability to solve immediate human challenges, while also working to accelerate the transformation of key sectors in rapid transition, such as space and sustainability.

Dana Linnet is Senior Executive for Market Engagement at Artificial Brain USA. Dana is a former senior U.S. Government official and diplomat. Since leaving government she has served as a defense and aerospace executive at Lockheed Martin, Sales Director and Senior Advisor at Guidehouse LLP’s National Security Sector, and Global VP at a Silicon Valley AI start up. She’s also the CEO of The Summit Group DC a consulting firm specializing in Space, NetZero and Defense and Emerging Technologies.

 

FedRAMP Rev 5 and Beyond:
Your Key to Secured Cloud Systems and Applications

In partnership with  and 

 

 

 

Since its launch in 2011, FedRAMP has become the best practice for selecting, deploying, and managing cloud systems and applications in the U.S. Federal Government. And in January 2023, the FedRAMP Authorization Act made FedRAMP the law of the land! 

Don’t miss this strategic webinar to learn about the new release of FedRAMP and where FedRAMP is headed in 2024 and beyond. If you are a federal civilian or defense agency, a state and local government seeking to improve its cloud adoption, or a cloud services partner supporting governments, you will want to see this webinar live and be part of the discussion.

 

Partnerships in Cybersecurity Education and Workforce Development

 

 

 

Cybersecurity education and workforce development is a significant issue given large current national capability and skills gaps. In this webinar, we bring together key partners and major stakeholders from the public sector, private sector, and academia to discuss pathways of collaboration and partnerships moving forward to solving this important problem. Panel members will discuss their experience and “best practices” to reduce these capability gaps and assist with the preparation of a new generation of skilled cybersecurity and AI professionals.  

A Look at Evolving Insider Risk Programs

 

 

 

Insider Risk Programs have continued to evolve naturally over the past 20 years. They have grown exponentially beyond the traditional lens of trying to identify spies through cyber-focused data exfiltration events.

In this webinar, we talked with experts who have guided these changes and who are still seeking to drive change across the insider risk mission space. 

Quantum Speaker Series Presents: Export Control Landscape for Quantum Technology

 

 

 

Participate in an insightful panel discussion as we delve into the crucial topic of federal software supply chain modernization and compliance standards for Software Bill of Materials (SBOMs) in line with The President’s Executive Order 14028. This webinar aims to address the challenges faced by federal agencies, share best practices, explore avenues for improving efficiencies, and establish a compliance standard for SBOMs in the software supply chain.

Using NIST Guidance to Manage Security of Mobile Devices

In partnership with 

 

 

 

Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout the Enterprise Mobile Lifecycle. The standard offers a holistic approach to mobile device protection guidance, covering mobile threat defense, application vetting, centralized device management, endpoint protection technologies, and looks at both organization-provided and bring-your-own-device scenarios.

Identity Governance; A Critical Enabler of Zero Trust

In partnership with   

 

 

 

Office of Management and Budget (OMB) Memorandum M-22-09 requires “agencies to achieve specific zero trust security goals” and designates “Identity” as the first of five pillars from CISA’s zero trust maturity model. Additionally, M-22-09 provides specific actions for the Identity pillar that include, employing centralized identity management systems that integrate with agency applications and platforms; leveraging phishing-resistant MFA throughout their enterprise; and using device level signals along with other data for access authorization decisions. 

Identity governance involves managing roles, segregating duties, performing analytics, maintaining logs, and generating reports. These components collectively enable organizations to manage access to organizational resources to promote mission accomplishment while mitigating risk. This webinar will focus on the opportunities and current challenges in using identity governance approaches to enable the achievement of zero trust cybersecurity goals. Panelists will discuss the current or envisioned use of identity governance methods and tools within their organization and share lessons learned for the identity pillar on their journey towards zero trust.

 

Growing Good in Government by Building the Feedback Loops of the Future

In partnership with   and  

 

 

 

In an era where rapid technological advancement is reshaping industries, the public sector stands at a pivotal juncture.  The Growing Good in Government Initiative (G3I) emerges as a beacon for this transformational journey, striving to usher federal agencies into the age of digital and artificial intelligence. 

This panel discussion delves deep into the heart of G3I, unpacking its strategic objectives, the role of self-organized teams, and the initiative’s overarching vision to rejuvenate governmental processes.  Bringing together key stakeholders, experts, and pioneers of the initiative, the discourse will illuminate the challenges and triumphs of implementing such a transformative strategy in a bureaucratic setting. 

Quantum Speaker Series Presents: Optimization Landscape Using Quantum Computers

 

 

 

Alex Khan is an advisor, entrepreneur, author and educator in quantum computing. He is CEO of ZebraKet, a Canadian startup in leak detection and sensor optimization using quantum methods and AI. He is the author of “Quantum Computing Experimentation with Amazon Braket”. He presented a brief tour of various real-world optimization use cases and realities of solving them on current quantum devices and other quantum inspired solvers.

As cloud adoption accelerates, we’ll discuss potential concerns related to exclusive reliance on Cloud Service Providers (CSPs). Discover strategies to maintain solution diversity, reducing dependency on a single vendor and ensuring a robust cloud ecosystem.

This engaging session offers firsthand perspectives from leaders shaping cloud migration strategies, all while managing security complexities. Don’t miss this opportunity to grasp the intricacies of modernizing government operations through strategic cloud integration.

AI Bill of Rights Framework: Safe and Effective Systems & Human Fallbacks

In October 2022 the Office of Science and Technology Policy (OSTP) released their “Blueprint for an AI Bill of Rights”, intended to inform and shape the development of federal AI policy. In response, ATARC is hosting a series of webinar panels to promote discussion and provide clarity on the Blueprint’s structure and goals.

These panels will bring together government leaders, academics, and researchers, with the hope that these discussions will further the effective implementation of US federal AI policy. Our third panel discussing the Blueprint will focus on the “Safe and Effective Systems” and “Human Fallbacks” Pillars.

America’s Software Supply Chain: How Secure Are We?

In partnership with 

Strengthening the accessibility of the Federal government’s resources by reducing barriers and streamlining the processes are only two of the proposed strategies to reinforce the customer experience. This can be completed with modernization of programming, reducing administrative burdens, and utilizing new tools and technologies to offer a more simple and secure customer experience. Tune into this webinar to hear experts discuss the first steps in addressing the new customer experience requirements, what infrastructure needs to be in place to ensure that the American public is receiving the best care, and what are some emerging technologies that will aid in fulfilling these new goals?

Strengthening Federal Software Infrastructure: Importance of SBOM Compliance Standards

In partnership with

Participate in an insightful panel discussion as we delve into the crucial topic of federal software supply chain modernization and compliance standards for Software Bill of Materials (SBOMs) in line with The President’s Executive Order 14028. This webinar aims to address the challenges faced by federal agencies, share best practices, explore avenues for improving efficiencies, and establish a compliance standard for SBOMs in the software supply chain.

 Zero Trust: Driving Transformation and Modernization in Federal Cybersecurity

In partnership with 

Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize their ZT plans and get the most out of this forward-thinking architecture.

Elevating Benefits Management: Redefining Customer Experience

In partnership with  

Strengthening the accessibility of the Federal government’s resources by reducing barriers and streamlining the processes are only two of the proposed strategies to reinforce the customer experience. This can be completed with modernization of programming, reducing administrative burdens, and utilizing new tools and technologies to offer a more simple and secure customer experience. Tune into this webinar to hear experts discuss the first steps in addressing the new customer experience requirements, what infrastructure needs to be in place to ensure that the American public is receiving the best care, and what are some emerging technologies that will aid in fulfilling these new goals?

How Low Code Empowers and Strengthens the Federal Workforce

In partnership with 

Advancing the federal government’s digital evolution necessitates a collaborative effort beyond IT professionals, involving every employee in streamlining processes to enhance efficiency. With a mission-focused and increasingly tech-savvy federal workforce, leveraging low code technologies emerges as the perfect approach to rapidly develop applications that drive immediate improvements in government operations. Tune into this panel to listen to IT, mission, and technology experts explore the transformative potential of low code in expediting the digital government landscape. This discussion will address the implementation of necessary governance, controls, and training to support and scale resulting solutions across the entire enterprise.

Securing Access to Data: An Exploration of ICAM and ABAC

In partnership with 

In today’s interconnected and rapidly evolving digital landscape, ensuring secure access to sensitive resources is of paramount importance. There are various methods of securing data and Federal agencies have explored a majority of them. In this panel, Federal experts will help provide a comprehensive understanding of ICAM and ABAC and their potential to address access control challenges in today’s digital landscape. They will also touch on valuable insights into practical implementation strategies and future directions for these frameworks, enabling them to make informed decisions in designing and deploying effective access control solutions within their organizations. 

Breaking Silos: Advanced Analytics for Government with Enterprise Data Graphs

In partnership with 

Join us as topic experts discuss the benefits of employing analytical techniques and software platforms designed for exploring and modeling complex networks of interconnected data tools for enterprise-level data analytics in government organizations. We will highlight the advantages of graph-based data modeling, which allows agencies to represent complex relationships between data points in a way that is both intuitive and highly efficient. Additionally, we will discuss emphasizing the importance of real-time analytics, which enable government organizations to make rapid decisions based on the latest data.

AI Bill of Rights Framework: Notice and Privacy

In October 2022 the Office of Science and Technology Policy (OSTP) released their “Blueprint for an AI Bill of Rights”, intended to inform and shape the development of federal AI policy. In response, ATARC is hosting a series of webinar panels to promote discussion and provide clarity on the Blueprint’s structure and goals. These panels will bring together government leaders, academics, and researchers, with the hope that these discussions will further the effective implementation of US federal AI policy. Our second panel discussing the Blueprint will focus on the “Notice” and “Privacy” Pillars.

Elevating Benefits Management: Redefining Customer Experience

In partnership with

Strengthening the accessibility of the Federal government’s resources by reducing barriers and streamlining the processes are only two of the proposed strategies to reinforce the customer experience. This can be completed with modernization of programming, reducing administrative burdens, and utilizing new tools and technologies to offer a more simple and secure customer experience. Tune into this webinar to hear experts discuss the first steps in addressing the new customer experience requirements, what infrastructure needs to be in place to ensure that the American public is receiving the best care, and what emerging technologies that will aid in fulfilling these new goals.

Protecting Critical Infrastructure with Quantum-Resistant Cybersecurity

In partnership with

Modern cybersecurity measures such as post-quantum cryptography (PQC) and zero trust architecture (ZTA) are essential to protect U.S. critical infrastructure and ensure a resilient nation. And with a flurry of comprehensive initiatives coming from the Executive Branch, Pentagon, NSA, and NIST, it can be challenging for U.S. government CIOs and CISOs to determine where to prioritize resources. But PQC and ZTA aren’t mutually exclusive: effective, agile cryptography forms the basis of zero trust principles and eases PQC adoption.

Streamlining Security Authorization through OSCAL Automation

Presented by

Federal agencies must undergo the complex and laborious process of security authorization to operate (ATO) for each information system (IS) in accordance with the Federal Information Security Modernization Act (FISMA). Currently, most agencies rely on manual documentation processes. These include popular productivity tools to capture the applicable security controls and the status/plans of implementation of the controls for each IS as well as an enterprise Governance, Risk and Compliance (GRC) tool for documentation repository and ATO tracking purposes. This webinar will focus on the opportunities and current challenges in leveraging OSCAL and integrating OSCAL-based ATO processes gradually into agency FISMA processes.

Cyber Resilience for Modern, Agile, and Trusted Agency Environments

Presented by

Today’s cybersecurity threat landscape means Federal professionals must take a proactive and practical approach to defending agency personnel, systems, networks, and data. IT infrastructures need resiliency that is built in, understood by the workforce, and prepared to work beyond the next threat. Creating a resilient IT architecture is not an admission of anticipated defeat. Rather, it’s insurance against probable events and incidents that could compromise government operations and mission integrity. Plan to attend this interactive dialogue to learn how organizational and technical resilience combine to keep agencies prepared and responsive to mitigate cyberattacks—whenever and wherever they occur.

AI Bill of Rights Framework: Algorithmic Discrimination

In October 2022 the Office of Science and Technology Policy (OSTP) released their “Blueprint for an AI Bill of Rights”, intended to inform and shape the development of federal AI policy. In response, ATARC is hosting a series of webinar panels to promote discussion and provide clarity on the Blueprint’s structure and goals. These panels will bring together government leaders, academics, and researchers, with the hope that these discussions will further the effective implementation of US federal AI policy. Our first panel discussing the Blueprint will focus on the “Algorithmic Discrimination” pillar, especially its concerns and protections.

Accelerating Zero Trust with Complete IT Asset Visibility

Presented by

To advance Zero Trust mandates, federal IT leaders need an accurate, trusted, and complete picture of their entire IT estate. Attend this webinar to learn how your agency can better comply with OMB’s January 2022 memo, M-22-09, Moving the U.S. Government Toward Zero Trust Cybersecurity Principles. Learn the importance of validating and enriching their IT asset data against industry-leading libraries and data sets to ensure their situational awareness is trusted, complete, and current. Join our webinar to hear from experts how you can build the critical foundation of IT visibility for your agency’s Zero Trust program.

Tradewind Solutions Marketplace

The Tradewind Solutions Marketplace has been making waves since it launched on Nov 1, 2022. Since then, countless companies have submitted solutions videos for assessment. Many of those videos have been deemed awardable and have been placed into the Marketplace — ready to be purchased by the Government. The Tradewind Solutions Marketplace team is determined to continue spreading the word about how the Marketplace can help industry, academia, and individual innovators get in front of eager Government buyers.  Join for an inside look into the Marketplace, along with all the tips and tricks you’ll need to be successful!

Quantum Speaker Series Presents: Overview of the Center for Quantum Technologies

The Center for Quantum Technologies (CQT) is an NSF-funded Industry/University Cooperative Research Center (IUCRC) and a partnership between Purdue University, Indiana University, and the University of Notre Dame, and also several industry and government members. The mission of the CQT is to collaborate with industry and government stakeholders to identify compelling needs and challenges in quantum technologies, and then develop novel solutions to address these opportunities. This talk will give an overview of the IUCRC model and detail the CQT mission and vision.

Navigating cATO Challenges in the Federal Government: Best Practices and Strategies

Presented by

Join our thought leadership webinar to learn about the current operational challenges that federal agencies face on their journey to cATO and how to address them effectively. In this session, we’ll delve into the common challenges of proving compliance, vulnerability management and reporting, and assessing control effectiveness. We’ll provide real examples into best practices to address those challenges. Our panel of experts will provide actionable insights for developers, program managers, CIOs, CISOs, CTOs, Authorizing Officials (AOs), and security professionals on how to move from a paperwork-based approach to a risk-based approach.

Using Conversational AI with Complex Government Information

Presented by

Hear from experts about the value of using Conversational AI within government agencies to improve (a) accuracy in information retrieval, (b) control of training data and responses, and (c) how to build trust with users. Plus, learn how your organization can implement AI quickly, deploy multimodal conversational UX to navigate complex information, and do it cost-effectively. Don’t miss this opportunity to gain valuable insights into how Conversational AI can help streamline, automate, and enhance information access within the Federal Government.

Tradewind Solutions Marketplace

You have heard all the buzz about the Tradewind Solutions Marketplace. But do you know the inside tricks to getting your solution into the Marketplace? Join us for a panel of Marketplace insiders who will give you the best tips on submitting an awardable submission on your first try! Panelists will share lessons learned from the first few rounds of assessments and reveal what made awardable submissions stand out from the crowd. They will also cover the top reasons why some submissions were deemed “non-awardable” and discuss the “Top 5” ways to ensure a winning submission!

Risk Management: A Group Effort

Presented by

Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. The reality is that cybercriminals are more sophisticated than ever before, meaning that the ability to defend, respond, and recover from a cyber event requires support across the organization. Neither IT nor security can cope alone. This panel will discuss the importance of resilience in today’s digital world and examine how to build a foundation for effective risk management throughout organizations.

DevOps Hurdles in 2023 and How to Overcome Them

One way or another, at the start of 2023, it’s apparent there are more hard DevOps questions than ever that need to be asked and answered. At this webinar, we invite experts and thought leaders in the field to discuss what obstacles remain in the way of true DevOps transformation, and how to best break down those barriers. What shifts should be prioritized for most gains – change in mindset, digital technologies, to further the DevOps Transformation Roadmap?

Fraudulent Behavior and How Identity Management Can Assist

Presented by  https://i0.wp.com/atarc.org/wp-content/uploads/2023/01/Untitled-2.png?resize=94%2C34&ssl=1

As identity theft is at an all time high, it is imperative that people understand how attacks happen and what they can do to lower risk of being targeted. The Federal Government has created ways to help identify fraudulent actions and developed ways to integrate ICAM strategies to help find and deny the attacks. Listen to thought leaders as they delve into ways to recover from successful fraud attempts and how important it is to establish a strong ICAM system.

Tactics for Web App Security Using Zero Trust Architecture

Presented by 

Join this webinar for tactical guidance that includes which pillars are most critical to focus on for AppSec, especially when integrating and automating vulnerability management across the software development lifecycle. Learn about the steps agencies can take to create an action plan following the DoD’s ZTA guidance, as well as guidance from the Cybersecurity & Infrastructure Security Agency (CISA). Hear how modern AppSec tools can assist with providing greater visibility into an agency’s overall risk posture, including analytics that provide deeper guidance. Lastly, learn why automation is vital for vulnerability validation, and how modern AppSec tools can help with orchestration for smoother workflows and processes.

Quantum Speaker Series Presents:

NSM-10 and the Transition to Post Quantum Cryptography – Dylan Presman, Office of the National Cyber Director

The Office of the National Cyber Director (ONCD), the Executive Office of the President’s newest policy office, has extensive responsibilities under National Security Memorandum-10. NSM-10 outlines the Administration’s plans to take advantage of the opportunities offered by emerging quantum technologies while simultaneously protecting the nation from threats posed by quantum technology. On the threat side, NSM-10 recognizes that while sufficiently mature quantum computers are probably still 20 years away, most classified information requires protection for 25 years and sensitive personal data can have a lifespan that is even longer. As such, NSM-10 requires Federal agencies begin their transition to quantum safe cryptographic systems. As a first step, NSM-10 requires Federal Agencies to inventory their most critical cryptographic systems by May 4. The EOP will release specific instructions to Federal Agencies on inventorying cryptographic systems and developing cost estimates for this transition, by mid-February.

SCRM: MITRE’s System of Trust: Supply Chain Assessment Synergy Consistency and Evidence-Based

Hear from Robert A. Martin a Senior Principal Engineer at the MITRE Corporation. This presentation explores the details of System of Trust (SoT), a community effort to develop and validate a process for integrating evidence of the organizational, technical, and transactional trustworthiness of supply chain elements for decision makers dealing with supply chain security. This framework defines, aligns, and addresses the specific concerns and risks that stand in the way of organizations’ trusting suppliers, supplies, and service offerings. Importantly, the framework offers a comprehensive, consistent, and repeatable methodology that is based on decades of supply chain security experience, deep insights into the  complex challenges facing the procurement and operations communities, and broad knowledge of the relevant standards and best practices.

Growing Trends and How to Accelerate Mission Impact in 2023

Presented by   

Government efforts to modernize saw substantial advancements in 2022: An overwhelming 91% of federal IT workers report their agencies have gained ground on digital modernization efforts in the past year, according to a recent survey of federal employees conducted by Wakefield Research on behalf of ICF. But while optimistic, these employees say their work is far from done. Just 30% have achieved continuous improvement in their modernization journey, leaving 70% still working to meet their goals. Join us as government and industry leaders discuss 2022 learnings, growing modernization trends, and what agencies need to know to accelerate mission impact in 2023.

New Cyber Threats & Recoveries in 2023 Data Security

Presented by

A focus on strengthening our cybersecurity workforce should be at the forefront of every agencies’ 2023 goals. The cyber workforce must evolve to address the challenges posed by our adversaries and meet strategic mission requirements, while also doing an exemplary job at managing data security. This requires agencies to reshape their understanding of what data security entails and how the future of cyber security must include prioritizing data security. Effective cybersecurity workforce development, alongside a shift in focus on Zero Trust Paradigms, should be the goal of every agency.

Tradewind Solutions Marketplace

Presented by Image result for tradewind ai logo

Join us for a webinar presentation on how the Tradewind Solutions Marketplace can be leveraged to find solutions for your Agency. Learn about the Marketplace’s rapid-acquisition features, and hear how the Marketplace is helping Government customers find solutions to their most pressing AI/ML, digital and data analytics problems.

Enhance and Extend: Zero Trust Principles and Identity Management

Presented by

A Zero-Trust approach to security allows for a defensible architecture in a new environment. ZT does not mean ripping out existing infrastructure and replacing it with the newest trend. ZT relies on the ability to enhance and extend your existing security protocols. Listen in as topic experts explore how legislation has pushed their agency to modernize and any hurdles they’ve had to face. This session will also include discussion of the roles of Zero Trust and identity practices.

Shifts and Transitions of AI and Data Analytics in Federal Government

Presented by 

Over the past three years, federal IT has been forced to transition and shift as we face new challenges with hybrid work, the COVID-19 pandemic, and supply chain issues. While we’ve faced challenges, new and emerging technologies have assisted in overcoming hurdles of integrating, updating, and training new and current employees on AI and leveraging data as a strategic asset. Hear government and industry leaders explain the challenges they’re facing and the solutions they’re deploying to address them. Where do these federal leaders see the future of AI and data analytics heading? What does it mean to strengthen your agency’s AI and data posture?

SCRM: The Cybersecurity Executive Order 14028 and Upcoming FAR Rules

Hear from Kelley Artz, the Supply Chain Risk Management Technical Lead at GSA as she disccuses the EO and how it is broad in scope, addressing many of the challenges faced with securing information and operational technology systems. As the Federal Government continues to move closer to proactive threat management, there are various ways you can help prepare to implement changes: Keep abreast of proposed updates to the FAR (Federal Acquisition Regulation), Anticipate potential future solicitation refresh and/or mass modification or manual modification of contract language to reflect guidance from National Institute of Standards and Technology) NIST, Cybersecurity and Infrastructure Security Agency (CISA) and/or GSA, Watch for GSA guidance and updates, Attend training sessions as they become available.

Steps for Acquiring and Implementing AI: Challenges and Successes

Presented by    H2O.ai - Crunchbase Company Profile & Funding

Choosing the best AI strategy & approach can be a long challenge as technical capabilities, governance, and administration, as well as requirements for security, privacy, civil rights, and civil liberties are all important steps in initiating AI. Listen in as experts discuss where they are in the procurement and implementation stages as well as where they see their agencies growing into. They will also discuss different issues and potential solutions that they’ve troubleshooted while working with AI.

Addressing the Cyber Security Priorities Set for Fiscal Year 2024

Presented by

Tune into this panel to hear from topic experts on how they plan to move forward with the cybersecurity funding priorities in place. How will agencies’ security policies be affected? What strategies are recommended to ensure the strategy and policy are fulfilled? How will agencies move forward with this new guidance laid out?

How To Be Prepared Against Evolving Software Supply Chain Attacks

Presented by

Combating modern-day software supply chain attacks is significantly more complicated than in the past. Adversaries are getting craftier and are no longer waiting to exploit publicly disclosed vulnerabilities to launch a cyberattack. Join our panel of experts as they discuss best practices to protect against evolving software supply chain attacks and emerging threats to your open source environment.

Responsible AI & Speed to Mission: How Can Government Agencies Achieve Both?

Presented by

Responsible AI ensures that end-to-end model management addresses the specific risks of AI (i.e., discriminatory biases and lack of transparency) in order to prevent compounding issues in the real world. But it is not always clear how to operationalize these broad principles or handle situations where there are conflicts between competing goals. In this session, data and AI experts in the public sector will share their journey to empowering speed to mission in their agencies, while taking Responsible AI from theory to practice.

2023 DFARS/CMMC 2.0 Regulatory Framework Update

Learn about the framework for leadership and stakeholders of the Defense Industrial Base (DIB) to make more informed business and cybersecurity decisions. Gain an understanding as early adopters and the opportunity to get secure, stay compliant, maintain current DoD contracts, and win more business. This presentation will provide participants with an overview of the current Department of Defense (DoD) DFARS 252.204-7012 and upcoming CMMC 2.0 regulatory requirements.

When All Fails: How To Be Cyber Resilient

Presented by and

Tune into this panel to listen to topic experts as they answer the following questions and speak to their cyber resilience plans: How would you recommend one assess a current cyber preparedness and ability to detect, respond and recover from a cyber attack? What are some best practices for data protection and recovery to help agencies avoid malicious activity or recover from a successful attack successfully How to best prepare the workforce to be more cyber resilient?

Upskilling The Federal Workforce to Meet Mission Objectives

Presented by

There doesn’t seem to be a week that goes by without a new publication on the government’s continuous need to upskill IT teams for cybersecurity, cloud computing, data, AI/ML, and more! The need for reskilling is foundational in the President’s Management Agenda, the Cybersecurity EO, Digital Literacy Bill, and the DoD Cyber Workforce Framework. Some agencies are further ahead than others. Learn from experts in the field on how to go beyond talking about reskilling and start acting.

ATARC And FMG’s Mobile Breakfast Summit

Mobile devices have revolutionized the way we do work, enabling on-demand access to services and information anytime from anywhere.  Modern mobility brings along an ecosystem of networks, operating systems, mobile applications and their supporting cloud services.  Hear experts discuss security features for mobile tools, technologies, products, 5G, and services; and examine how agencies can improve on enterprise-wide mobile security strategy and policy.

The Quantum Security Challenge

Presented by

Quantum computing is advancing rapidly, and its impact is likely to be large—their potential computational power that could render today’s encryption algorithms obsolete. Attend this webinar to learn how to develop a quantum safe transition strategy. Panelists will discuss the quantum threat to today’s cryptography and provide guidance on how to prepare for the future. 

Using IOT and AI to Transform Operations, Improve Sustainability, and Increase Readiness

Presented by Healthcare - SymphonyAI

IoT and AI can also significantly improve the sustainability of large facilities. Facilities maintenance powered by these next-generation technologies can significantly reduce operational costs, minimize the energy footprint, and optimize working conditions. Learn more about the efficiency and savings from continuous monitoring of assets, and the widespread adoption of wireless sensors to create an Internet of Things.

How to Accelerate DevOps and Cloud With New SRE Practices

Presented by

Cloud computing has introduced new complexities to the public sector, with teams now being responsible for maintaining scalable infrastructure and applications in increasingly complex and distributed environments. The demand for automation has produced a new role, which has arguably become one of the most critical functions in a cloud-first business: the site reliability engineer. Learn why SREs are vital to the collaboration across a Federal IT department and how the roles of DevOps are changing.

ATARC 2022 Zero Trust Summit

What is the importance and role of emerging technologies while Federal agencies are in the process of adopting and implementing Zero Trust Principles? Hear about the challenges and best practices while agencies are in the process of adopting and implementing Zero Trust principles. Learn how and why emerging technologies are evolving at a faster pace than ever before, especially as the Government aims to implement Zero Trust Security.

Ethical Uses of AI with the Federal Government

Presented by File:Salesforce.com logo.svg - Wikipedia

AI has the power to elevate the citizen experience, using predictions and recommendations, while reducing a major burden on governments. Join our panel of experts as they discuss the journeys they’ve taken with implementing AI as well as the ethical dilemmas that have come up. Panelists will speak to the citizen experience, removing bias, and who “owns” AI in a department?

ATARC Identity and Access Management Virtual Summit

Presented by

Digital transformation and the increasing reliance on remote business continue to accelerate the adoption of new identity and access management (IAM) approaches and technologies. IAM and IT leaders face new business demands that require digital trust across every interaction and channel. Tune into this event to see how topic experts face these demands and hear about their best practices in the continued evolution of access management.

The New Workforce and Where We Are Heading

Presented by

Tune into this panel as topic experts dive into what it means to transform a workforce. As the workforce returns to the workplace, what best IT Modernization strategies do these topic experts recommend for continuing to transform the workforce? How does IT Modernization help transform the workforce?

Immediate Future: Are AIs Persons?

ATARC’s AI and Data Policy Working Group intends to investigate the policy implications of AI personhood for the US Federal government. We believe the topic will become critically important as technology advances, public awareness grows, and the limitations of current policies become apparent. Our goal is to help federal policy makers develop and implement policies in this area that conserve American values while enabling the development and application of emerging AI technologies. We hope to accomplish this goal by providing a forum for broad stakeholder discussion of AI personhood in order to develop clarity of what AI personhood means, how it might affect society and the government, and what areas of focus should be in developing relevant policy.

The Importance of Identity Management Virtual Summit

Hear as topic experts discuss the importance of Identity Management within federal agencies and how the hybrid workforce has affected it. What best practices do these topic experts recommend to help best protect data? How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls?

Stronger Together: How to Empower Federal Agencies’ Cybersecurity

Presented by

The last five years have seen an increase in the success of Federal agencies’ cybersecurity due to legislation and funding. However, the threats that we are now facing have advanced in the five years that we’ve been playing catch-up. In addition, more of the Federal government has transitioned to heavily relying on technology and cloud infrastructure as we dealt with the COVID-19 pandemic. Tune into this webinar to hear experts explain the challenges they’re facing with growing cybersecurity threats while attempting to update and secure across all Federal agencies!

ATARC 2022 Cloud Migration Virtual Summit

Tune into this panel to hear from Federal topic experts on the reasons to migrate to the cloud, common migration experiences, and the benefits cloud migration can bring. What lessons have these topic experts learned while making the shift to the cloud? What challenges did they face? What best strategies did they have to put in place to overcome these challenges?

ATARC 2022 Health IT Virtual Summit

Tune in as topic experts explore the Federal Health IT Strategic Plan, what it means for agencies, and the steps needed to implement it. In what ways do these topic experts see the future of the Federal Health IT Strategic Plan being strengthened by using data? What will that look like within the Federal Government? Hear from thought leaders and topic experts on how to create great and sustainable citizen experiences, vaccinate Americans, and enable a safe return to work.

Accelerating Zero Trust Implementations with Network Visibility

Presented by

OMB’s memorandum M-22-09, “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles,” is setting deadlines for implementation across the government. Specifically, the memo calls out the end of FY24, for multiple actions across the CISA-defined five pillars of a Zero Trust Architecture. Tune in as this panel of topic experts explores what it takes to build a proper network baseline to ensure that all valid use cases are accounted for. 

Best Practices for DevSecOps and Authority to Operate (ATO)

Presented by

Shifting left and building software with security and compliance integrated from the start is critical to increasing trust in our digital infrastructure. Join us for a virtual event with a panel of U.S. government cybersecurity experts to learn more about recommended best practices to obtain ATO and deploy software faster.

Strengthening Cybersecurity in State and Local Agencies using Zero Trust

Presented by

Most IT leaders acknowledge the growing threat from ransomware, however many state and local governments are unprepared to prevent or respond to it. Join this webinar to hear state and local cybersecurity experts outline how to build effective protection against ransomware by making Zero Trust a strategic priority. They will explore the best practice for implementing a Zero Trust architecture that ensures your backups are truly immutable.

ATARC 2022 AI & Data Analytics Virtual Summit

Listen in as topic experts explore how the use of artificial intelligence to increase fairness and equity has become important throughout governmental decision-making. How should the government validate, measure, and ensure the ethics and fairness of AI systems and decisions? What steps are completed and planned to leverage AI towards improvement in overall government operations?

Planning for Phishing-Resistant Multi-Factor Authentication

Presented by

The May 12, 2021 White House Executive Order 14028 and subsequent Office of Management and Budget Memo M-22-09 set forth a Federal Zero Trust Architecture strategy and a new baseline for access controls. In order to reinforce the government’s defenses against increasingly sophisticated and persistent threat campaigns, agencies are now required to meet specific cybersecurity standards and objectives by the end of fiscal year 2024. Attend this webinar to hear Federal topic experts discuss how they are moving to implement the phishing-resistant protocols.

Building for Secure MultiCloud Environments within State and Local Agencies

Presented by and

Managing a decentralized ecosystem comes with challenges and complexities. The path forward requires a new strategy, the right investments, and trusted partners. Tune in as this panel of topic experts explores what it takes to build a secure modern hybrid ecosystem that serves state and local government needs today and into the future.

What’s Out There? –Overview of Standards and Mandates, Tools and Solutions to Manage Cyber Supply Chain Risks

Federal government agencies rely extensively on IT products and services to carry out their operations. There is, however, cybersecurity supply chain risk in connection with acquiring, deploying and using these products and services. This is evidenced by the numerous supply chain attacks over the past decade such as the Target data breach in 2013, Solarwinds attack in 2020 and Kaseya attack in 2021. As a result, the federal government has taken several actions in an effort to address cybersecurity supply chain risk and these actions have resulted in executive orders, laws, regulations, guidance documents, etc. This roundtable discussion will provide information on the federal government actions in the last several years, resources that can help with establishing a SCRM program, available tools to conduct SCRM across the federal government, the challenges associated with conducting SCRM and the help available for agencies in meeting the mandates to implement SCRM.

The Rise of Phishing-Resistant MFA: How We Got Here and How to Move Forward

Presented byPing Identity logo

The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities—and for good reason. During this webinar, experts on Federal identity will discuss the history of identity verification and authentication in the Federal Government, and the key security use cases authentication technology needs to support today.

Make Every Second Count When Recovering from Cyber Outages

Presented by and 

During this panel, topic experts will explore how agencies can make every second count when recovering from an outage. What best practices and tools do they recommend? Are there any challenges that should be anticipated and if so, what solutions are effective for overcoming them? Our panelists will answer these questions and more as they dive deep into the importance, benefits, and steps to managing, implementing, and executing effective data protection strategies.

Quantum Speaker Series – Barbara Goldstein (NIST)

Ms. Barbara Goldstein serves as Associate Director of the Physical Measurement Laboratory, the largest operational unit at NIST consisting of approximately 1300 staff and associates and two joint institutes, and which is responsible for realizing and disseminating rigorous measurements to support commercial, defense and research enterprises. Ms. Goldstein manages the “NIST on a Chip” program which is establishing a new paradigm for precision measurement dissemination through a suite of deployable, fit-for-purpose, quantum-based standards to be embedded in products or installed at user sites.

Impact of AI and Machine Learning on Financial Crime Investigation

Presented by Healthcare - SymphonyAI

Government agencies are struggling to cope not only due to an acute shortage of skilled manpower, but also because there are no predefined rules on how to detect bad actors in these new and emerging situations. Watch our webinar to learn more about current challenges facing financial regulators and law enforcement agencies, and using AI and machine learning to recognize and track criminal behaviors.

One Year In: The Executive Order and Securing Software Supply Chains

Presented by Anchore

In response to the Executive Order on Improving the Nation’s Cybersecurity published in May 2021, new mandates call for accelerating the adoption of secure open source software (OSS) and commercial off-the-shelf solutions to speed software delivery from years to minutes. Join us for a panel discussion with experts from across the Federal defense agencies as they cover key insights from the Executive Order on Cybersecurity.

Colonial Pipeline in Retrospect: Securing the Nation’s Critical Infrastructure

Presented by 

The Biden Executive Order, extended 100-day action plan, and other directives call for private-public collaboration to protect the nation’s grid, water/wastewater facilities, and pipelines, but how do you take action to implement shared defense between the public and private sectors? In this webinar, General (Ret.) Keith Alexander and Brandon D. Wales, Executive Director, Cybersecurity and Infrastructure Security Agency, will discuss with Joe Marks, from The Washington Post, ways to implement a Collective Defense approach to securing the nation’s critical infrastructure.

GITEC 2022 Emerging Technology Conference

The 2022 GITEC Emerging Technology Conference provided opportunities between leaders within government, academia and private industry to discuss the state of the current IT landscape. During the event there were panels and conversations offering collaborative forums for identification, discussion, and resolution of emerging technological challenges.

Reducing the Attack Surface in Government Agencies

Presented by 

Cyberthreats are disrupting our lives now more than ever, and we’ve reached a tipping point. Agencies are turning to Zero Trust for complete network security, but are unsure how to make Zero Trust actionable. Tune in for this virtual event with a panel of cybersecurity experts as we explore how to navigate the journey toward a Zero Trust approach.

Data Analytics Lab Presentation

GSA wants to improve the utilization of small businesses on federal contracts. In support of this goal, they would like to use AI and machine learning to analyze procurement data from the Federal Acquisition Service (FAS). As part of this effort, GSA asked the ATARC Data Analytics and AI Lab (ADAAL) to build a Spend Analysis prototype focused on analyzing contracts awarded by various agencies over the past few years. The prototype was built using SymphonyAI’s patented award-winning EurekaAI platform, leveraging the secure lab environment provided by nAbleLabs. The presentation describes the background and scope of the GSA Spend Analysis Prototype, the EurekaAI platform used to implement it, results of the prototype, and potential next steps. The prototype was used to analyze FAS data for 376,000 IT contracts awards awarded over a 4-year period (2017 – 2021). for the analysis was on contracts awarded by GSA, DOJ, HHS, and DOD.

2022 Emerging Technology Virtual Summit

Listen as leaders in the field discuss how different emerging technology will impact the way federal employees continue their work in government. Emerging Technologies are evolving at a faster pace than ever before, especially as the workforce pivots to a telework environment. In this event hear about how drones and expanding the IOT can help Federal agencies get assimilated to the use of emerging technologies.

Combating Cyber Attacks Within State and Local Governments

Presented by

As ransomware and other cyber attacks continue to rise, agencies must prioritize strengthening their cybersecurity. Creating and implementing an in-depth strategy to help build a reliable and resilient security infrastructure is critical to preventing a host of unwanted outcomes. During this event, state and local cybersecurity experts from agencies across the country will explore the steps that their security teams are taking to harden their environment from attacks.

Federal Mobility Group and ATARC 5G Government Symposium

The Federal Mobility Group (FMG), in partnership with ATARC, is holding its annual 5G Government Symposium to drive greater awareness of fifth generation (5G) technologies, highlight innovative use cases and showcase current deployments.

Access Management and DevOps: How to Cater them to Hybrid Work

Presented by

DevOps support has become essential to many organizations looking to become more responsive and innovative in our evolving digital world. Application developers and other agile teams increasingly need privileged access to essential tools to work in dynamic environments. Join government security experts to discuss how advanced secrets management enables agencies to accelerate their digital transformation and DevOps projects.

Government-Wide Category Management Industry Day

Category Management is the practice of buying common goods and services as an organized enterprise in order to improve the efficiency and effectiveness of acquisition activities. Tune in and hear discussions of the current issues and solutions of category management in regard to small businesses and requirements gathering! This insightful Industry Day will feature 3 sessions of panels including “Using Data to Design Small Business Strategies”, “IT Category Panel: Strategies for Small Business Success in IT”, and “Best Practices for Requirements Gathering”.

ATARC Law Enforcement Summit: Securing Your Environment with Automation

Presented by

Tune into this session to hear from Federal Leaders on the unique challenges of managing these identities across hybrid cloud environments. What are the fundamental capabilities needed for management of millions of  identities within this hybrid cloud environment? Listen as subject matter experts address different Federal hybrid cloud use cases, as well as lessons learned throughout this process.

2022 Hybrid Cloud Virtual Summit

Tune into this session to hear from Federal Leaders on the unique challenges of managing these identities across hybrid cloud environments. What are the fundamental capabilities needed for management of millions of  identities within this hybrid cloud environment? Listen as subject matter experts address different Federal hybrid cloud use cases, as well as lessons learned throughout this process.

Mapping a Zero Trust Journey for the Federal Government

Presented by 

Cyberthreats are disrupting our lives now more than ever, and we’ve reached a tipping point. Agencies are turning to Zero Trust for complete network security, but are unsure how to make Zero Trust actionable. Tune in for this virtual event with a panel of cybersecurity experts as we explore how to navigate the journey toward a Zero Trust approach.

The Executive Order: The President’s Management Agenda and Customer Experience

Presented by

As a part of The President’s Management Agenda, Priority #2 focuses on the customer experience and asks the Federal government to refine their current standards to better fit the needs of the American people. During the event, experts discuss what the first steps in addressing the new customer experience requirements are, and what infrastructure needs to be in place to ensure that the American public is receiving the best care.

DevSecOps: Reducing Risk at Scale Virtual Summit

Presented by

Where do topic experts see the future of DevSecOps going? How does security by design impact compliance? What does the future of security by design look like? In today’s environment Federal agencies have an urgent focus on cybersecurity, digital modernization, and delivering services online to the citizens and communities they serve. Hear subject matter experts dive into what they are doing to ensure consistent DevSecOps practices while becoming secure by design.

Modernizing Authentication Through the Use of Identity Management

Presented by    and  Media - Datasheets, case studies, webinars, logos - Digital Workplace by  ISEC7

Identity Management platforms give organizations the tools to ensure that the right users are accessing the right information on the right devices.  These tools can mitigate security concerns by managing access and also enhance user experience by providing seamless access to corporate applications.  Join us to hear government leaders discuss the challenges they face with their unique workforces and the processes they put in place to authenticate mobile users.

Disrupting Cyberattacks with Zero Trust and Strong Cyber Hygiene

Presented by  

The increasing complexity of government networks has opened new paths for adversaries to launch cyberattacks. Tune into this event to learn how creating a strong cyber hygiene routine aids in ensuring that your systems and devices are protected from threats. Cybersecurity experts will outline where to start, the best tools to use, the best practices to follow, and the many benefits of this basic practice.

ATARC’s Women In Tech Virtual Summit

Presented by

What challenges did topic experts face as they entered the STEM workforce as women? Listen as our panelists talk about the progress that has been made in increasing diversity in STEM fields, and what work still needs to be done. Listen as topic experts dive into the best strategies for harmonizing DevOps and DevSecOps tools, processes, and policies throughout the Federal Government. What lessons have these topic experts learned while harmonizing these tools, processes and policies?

Returning to the Workplace: Using IT Modernization to Transform the Workforce

Presented by Zoom Logo

Tune into this panel as topic experts dive into what it means to transform a workforce. As the workforce returns to the workplace, what best IT Modernization strategies do these topic experts recommend for continuing to transform the workforce? How does IT Modernization help transform the workforce?

Strengthening The Future of DevOps Through Emerging Technology

Presented by

Listen as DevOps Experts explain the importance of DevOps across the Federal Government. In this period of time of building the “new normal,” What emerging technology has led to strengthening DevOps? This panel will set out to explain the emerging technology that has been used to help strengthen federal DevOps, along with the future of DevOps in the Federal Government. What does it mean to strengthen your agency’s DevOps? Where do these Federal Leaders see the future of DevOps going, and what emerging technology will help it get there?

Priority 1: Strengthening and Empowering the Federal Workforce

Presented by

Priority 1’s focus on the American workforce challenges government agencies to become model employers in terms of diversifying their workforce and the support they provide those employees. Recruiting and retaining the best and brightest means ensuring the tools and services they use in the workplace are modern and familiar to those they use outside of work.  Join this discussion to hear topic experts discuss how the hybrid workforce has impacted their safety and efficiency.

Extended Detection and Response: The Swiss Army Knife of SOC

Presented by 

Many federal agencies require FedRAMP authorization before deploying cloud-based solutions, including XDR. Attend this webinar to understand how XDR is revolutionizing SecOps while meeting the stringent security and compliance requirements of government organizations. Hear from a panel of cybersecurity experts as they discuss, key challenges and opportunities for security teams, the evolution of EDR to XDR and how it’s changing SOC operations, and how XDR can help you achieve Zero Trust by verifying the trust decisions made across your organization.

Accelerating Cloud Modernization through Migration within the Federal Government

Presented by Hewlett Packard Enterprise - Wikipedia

Tune into this panel to hear from Federal topic experts on the reason to migrate to the cloud, common migration experiences, and the benefits cloud migration can bring. What lessons have these topic experts learned while making the shift to the cloud? What challenges have these topic experts faced while modernizing their agency’s cloud? What best strategies did they have to put in place to overcome these challenges?

ATARC’s Mission Critical Identity Security Virtual Summit

Presented by  

 

During the event, topic experts explained how they are using The DevSecOps software development methodology to solve key challenges, and explained why pivoting from their legacy applications to maintain development and availability requirements has become a tough challenge.

Working Together: Securing Modern Application with DevSecOps

Presented by  F5 | Multi-Cloud Security and Application Delivery

 

As agencies begin to pivot from their legacy applications and embrace containerized environments, satisfying security, development and availability requirements is a tough challenge. The DevSecOps software development methodology is a proven solution to this challenge whereby coders, cybersecurity specialists, and system administrators all work together in a more effective way to produce software and maintain compliance. Please join our panel of experts as they discuss key questions: What’s driving these changes in how agencies deliver new applications? What could organizations do to improve as they equip their teams for ongoing technology evolution?

Leveraging Predictive Analytics to Address Climate Change Issues

 

 

The impact of climate change is wide-ranging and encompasses environmental, financial, and safety issues. Data, including sensor data, real-time or near real-time data and analytics, and predictive analytics are essential tools for the Federal Government to leverage to predict, forecast, and mitigate the adverse effects of climate change. In this event, climate change and data science experts will discuss best practices, use cases and initiatives, and the best path forward on how data and predictive analytics can be leveraged in supporting an action plan.

ATARC Federal CIO Virtual Summit

During this event, Federal CIO’s dived into the Cybersecurity Executive Order and what it means for their agencies. Also, they discussed best practices that they have for incorporating emerging technologies as the Federal workforce transitions into a hybrid workforce.

Cybersecurity Threats in the Cloud Software Supply Chain

Presented by   

Tune in to this panel to hear what topic experts have to say on threat assessment within the cloud and how the Executive Order impacted agencies’ cloud security practices. This panel will discuss key questions such as how can Zero Trust principles help alleviate security concerns within the cloud? How have specific agencies reacted to the new executive requirements for security and cloud management? 

ATARC Digital Transformation Virtual Summit

The term “digital transformation” is meant to spur change. To optimize the technology and human resources involved in delivery of Citizen Services, Federal Agencies are embarking upon digital transformation journeys – modernizing IT applications and infrastructure. How are governments planning for and executing upon this transformation and what barriers do they face in completing this journey? Tune in as panelists dive into 2022 Digital Transformation planning, what it will look like and what it means for their agencies’ Digital Transformation Journey.

Fostering Effective DevSecOps with Modern Application Security

Presented by 

Join this webinar to learn how modern application security tools help agencies cover more of the software development lifecycle to improve security posture and achieve compliance. Topic experts will discuss DevSecOps processes and how government agencies are improving communication and enabling security adoption to produce more secure web applications.

Dear Security, Compliance, and Auditors, We’re Sorry. Love, DevOps

Presented by 

DevOps solved the Developer and Operators conflict, although forgot other essential folks of the delivery lifecycle: Security, Compliance, and Audit. Tune into this panel as topic experts discuss practical ways to get started with continuous authorization for the software delivery lifecycle. What are some best strategies for implementing a continuous authorization for the software delivery lifecycle within your agency?

ATARC Federal IT Modernization Virtual Summit

Digital modernization is the adoption of new technology. It involves upgrading systems, platforms and software to meet today’s modern needs. When agencies set out to improve their digital transformation, they must take advantage of innovative technology to reimagine an organization’s processes, culture, people and customer experiences. It can result in new business models, revenue streams, policies and values.

GITEC Emerging Technology Virtual Awards 2021

ATARC hosted the GITEC Emerging Technology Awards to help honor the teams deserving of recognition for helping modernize IT solutions within major emerging technology themes including promoting current Federal Administration priorities, and accomplishments unique to the challenges of the worldwide COVID-19 pandemic.

Working Together for Privacy Protection: The Importance of Identity Management

Presented by   Ping Identity logo

Tune into this panel to hear from topic experts to discuss the importance of Identity Management within federal agencies as the workforce shifts to a hybrid. What best practices do these topic experts recommend to help best protect data? How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls?

ATARC Digital Services Virtual Summit

In today’s Digital age, as our workforce is transforming into a hybrid environment, many Federal agencies are experiencing problems and challenges. Tune into this event to hear as topics experts address problems and challenges they have faced and how they are using the digital services to implement change to solve their challenges. Listen in as panelists discuss different highlights, successes and lessons learned, during this time.

ATARC Zero Trust Virtual Summit

Tune into this panel to hear from topic experts on the importance of emerging technologies while agencies are in the process of adopting and implementing Zero Trust Principles. In what ways do emerging technologies help this process? What best practices do these topic experts recommend when agencies are using emerging technologies to adopt and implement Zero Trust principles.

Developing and Executing a Data Governance Strategy in State and Local Government

Presented by 

Tune in to hear topic experts give their insights on the best practices for developing a data governance strategy in today’s hybrid world. How is this shaping decision making and policies? What pitfalls, if any, will agencies want to avoid as they look to evolve their policies and processes in relation to data security? Our panel of experts will discuss the best ways to execute a successful data governance strategy that allows agencies to collect, manage, store and catalog government data, while also identifying what data should be purged. Learn about the challenges their agencies have encountered while trying to secure and govern their data and how they overcame them.

Furthering Cybersecurity Within the State and Local Government Using Digital Modernization

Presented by   

In today’s environment state and local governments and higher education institutions have an urgent focus on cybersecurity, digital modernization, and delivering services online to the citizens and communities they serve. Cybersecurity is consistently ranked as a primary concern for state and local governments. This panel will examine the current challenges, recent successes and lessons learned within the state and local cybersecurity space.

Optimizing IT Operations With AIOps

Presented by    

Growing IT complexity means performing even routine operations can excessively tax an agencies IT resources. Using artificial intelligence to automate IT operations (AIOps) makes the impossible possible, enabling IT teams to effectively manage complex environments without piling on new tasks or yet more training – and allowing them to focus on higher value work. Learn how agencies are utilizing AIOps to do more with current capabilities, while speeding response times, reducing redundant work and multiplying productivity.

Improving Federal Cybersecurity with Event Data

Presented by     

The President’s Executive Order (EO) on “Improving the Nation’s Cybersecurity (14028)” issued on May 12, 2021 has aggressively outlined an action plan for protecting our nation against the increasing volume and danger of cyber attacks. This session features a panel of government and industry experts who will share their approaches and considerations in tackling the important demands of leveraging event data in cyber defense.

Protecting Against Ransomware in Federal Agencies

Presented by     

Advances in security technology have diverted cybercriminals from targeting individuals to a more lucrative approach; holding an organization’s entire operations hostage until a ransom is paid. With government agencies ranked as the 4th most likely sector to be hit by ransomware, it’s imperative that business continuity plans include backup and recovery. Learn how prepared agencies can render ransomware powerless.

Building a Cloud Smart Workforce

A key element of a successful cloud implementation is a properly skilled workforce.  Cloud technologies have matured to offer numerous technology solutions to meet any IT need, but knowing how to properly use the “tools in the toolbox” is imperative to move forward. Join us for a panel which will explore how academia is training the future workforce to be “cloud smart” on day one, what cloud and modern IT process skill sets hiring managers are looking for in employees, and what steps the government is taking to reskill their existing workforce.

Future of DevSecOps in Department of Defense Virtual Summit

Presented by

The relevance and importance of DevSecOps has grown in the past few years as agencies solidify their moves toward automating their software delivery lifecycle. Tune into this panel to hear from DoD experts on the importance of DevSecOps and what is in store for it in the future, as well as an exclusive exit interview from Nicolas Chaillan.

How to Improve Mobile Security Ecosystem

Presented by

Join this webinar to hear members of FMMWG share their research and findings recently published in a Mobile Security Ecosystem Paper. Topic experts will discuss security features for mobile tools, technologies, products, and services; and examine how agencies can improve on enterprise-wide mobile security strategy and policy.

Accelerating Government IT Modernization With Cloud

Presented by

When taking on the task of modernizing your cloud, one important factor is to make sure your data is secure. Tune into this summit to hear from topic experts on the best strategies to securely manage data while undergoing the modernization of an agency’s cloud, and dive into why modernizing cloud applications is important for cloud migration. How can the Government use these tactics to innovate and modernize their architectures accordingly?

ATARC Accelerating Government IT Modernization With Cloud Virtual Summit

Application modernization is a key consideration when switching from on-premises systems to the public cloud, whether the impetus is a cloud-first directive or a push from within IT to digitize legacy systems. It can reduce operational overhead, replace obsolete technologies and improve user experience. Tune into this panel as topic experts dive into why modernizing cloud applications is important for cloud migration. Hear as topic experts share the reasoning behind the benefits of modernizing cloud applications, rather than using the “lift and shift ” method.

ATARC Advancing Security Within the Federal Government Virtual Summit

As new technologies are being implemented and deployed throughout the Federal Government, agencies are having to take a step back and ensure their systems are secure. Hear from topic experts on best practices to enable enterprises to adopt new connected devices without fear of compromise by cyber-attack. How can agencies start modernizing to meet the needs of federal authentication? How can Zero Trust Security be implemented to benefit the Government?

Making IT Service Management and Security Solutions More Effective

Presented by   and

It’s no secret that getting a clear picture of your hardware, software, and services can be a challenge. Federal IT leaders frequently list vendor audits and unexpected software license true-up as a top concern. Add to the mix – constant adaptation to changing technologies, cyber-attack vulnerability mitigation, and IT asset availability and management in complex hybrid environments – and you start to uncover the challenges involved in Federal IT infrastructure and operations. Hear topic experts share their strategies that agencies can implement to alleviate the concern of the unknown and make operations more efficient.

Why Operational Technology and IT Management is Critical to Security

Presented by 

In today’s traditional Operational Technology (OT) management environment, organizations use outdated software that does not scale to the demands of the modern digital environment. Organizations have struggled to efficiently secure, monitor and manage an Operational Technology environment. Join this webinar to learn more about OT security risk management and solutions, benefits of the digital workflow for IT and OT environments and how to drive efficiency and productivity with OT system management.

Advancing Artificial Intelligence and Data Analytics in the Federal Government Virtual Summit 

Topic experts from the Artificial Intelligence and Data Analytics fields discuss what strategies and practices they have recently used in their respective Federal Agencies. What does implementing a Federal Data Strategy mean for a Federal Agency? Listen in to get answers to this and much more!

Hear From the Authors: Federal Zero Trust Strategy and Maturity Model

Presented by

Among other Federal Government initiatives, the Executive Order 14028 of May 2021, “Improving the Nation’s Cybersecurity” triggered the creation of three documents, critical to helping agencies to adopt zero trust cybersecurity principles and adjust their network architectures accordingly. Hear from representatives of co-authoring agencies about the importance, creation process, challenges and other insights related to the above mentioned guidance documents.

Modernizing Authentication Across Federal Government

Presented by

With NIST 800-63 Digital Identity Guideline guidance on Fast IDentity Online (FIDO) expected in 2022, Federal agencies need to start thinking about modernizing authentication across internal and external applications and infrastructures today. Hear discussion on the challenges of introducing FIDO into the Government, and best practices for Continuous Diagnostics and Mitigation (CDM) driven tracking and lifecycle management of FIDO tokens such as hardware security keys.

Transforming Agency Security Operations with Artificial Intelligence

Presented by 

To keep up with the constant threat of increasingly complex cyberattacks, agencies are turning to security operations that include Artificial Intelligence (AI), integration and automation. Tune into this event to learn how AI can help cybersecurity professionals maintain situational awareness of their operating environments. Topic experts will provide first hand insights into how practitioners are leveraging the latest AI innovations to accelerate security analytics, identify attack vectors, and enable advanced threat protection.

Navigating the Road Ahead for Zero Trust

Presented by 

In earlier ATARC Zero Trust sessions, we discussed why Zero Trust is important for securing enterprise resources in a cloud and multi-cloud environment. In this panel discussion, we will dig into practical approaches to executing a Zero Trust modernization plan. Topic experts will cover how priorities and strategies have evolved in the months since the Biden Cybersecurity Executive Order.

Securing Digital Government

Presented by 

How can agencies manage and secure an entire network using infrastructure they are already relying on? What strategies and tactics can agencies implement for building a defense-in-depth cybersecurity strategy? Join this webinar to hear from topic experts and thought leaders on how to deploy simple security to improve threat detection, prevention and remediation.

ATARC Advancing DevSecOps Throughout the U.S. Department of Defense Virtual Summit

Presented by  and 

Tune in as topic experts dive into what it means to adopt DevSecOps from a people-change perspective. How should the new organization be structured? What skills are necessary? Listen as topic experts explore how to scale a trusted approach to DevSecOps.

ATARC 2021 Digital Transformation Virtual Summit

Tune into this panel to hear from topic experts on how emerging technologies have transformed the Federal Government, as well as ways to strengthen an agency’s digital transformation journey. What challenges have these panelists experienced? What solutions were put in place to overcome these challenges?

ATARC 2021 Cloud Virtual Summit

Tune into this event to hear from Federal topic experts on the reason to migrate to the cloud, common migration experiences, and the benefits cloud migration can bring. What lessons have these topic experts learned while making the shift to the cloud? What challenges have these topic experts faced while modernizing their agency’s cloud? What best strategies did they have to put in place to overcome these challenges?

Why Zero Trust Solutions Are Essential for Protecting Multi-Cloud Networks

Presented by 

Covid-19 uncovered the Government’s need for a secure cloud environment. The migration to the cloud made organizations stop and think about their security posture and their readiness for this change. As more agencies move to cloud infrastructures, challenges arise with control over individual users’ devices. Is your agency implementing a Zero Trust model? Is there a multi-cloud security strategy in place? Tune in as subject matter experts discuss solutions and strategies when implementing a multi-cloud security network.

Empowering The American Rescue Plan

Presented by

The American Rescue Plan offers Federal, State and Local government agencies the resources they need to restore America’s communities. This bill was designed to facilitate America’s recovery from the economic and health effects of COVID-19. In order to mitigate the economic impact, organizations must be purposeful with their strategies not only for today but for tomorrow and the future onward. How can Federal agencies build and move forward? How can agencies aid in the advancement of policies on healthcare, employment and COVID response? Join this webinar to hear from thought leaders and topic experts on how to create great and sustainable citizen experiences, vaccinate Americans and enable a safe return to work.

Leveraging On Premise Cloud to Protect Critical Applications and Physical Security

An information-sharing event focused on leveraging intelligent infrastructure to support mission critical applications and the unique needs of physical security. With the convergence of physical and IT infrastructure, both security and IT professionals across Federal agencies can no longer rely on traditional three-tier infrastructures. To move forward, they need strategies, technologies, and flexible on-premise cloud-based infrastructure for the broad set of workloads to better anticipate, prevent, and investigate safety threats across their physical buildings and facilities.

Strategies for Leveraging Data in a Multi-Cloud Environment 

Presented by

Agencies have come to accept the cloud and migration of data to the cloud as the new normal. The adoption of a hybrid multi cloud data strategy is crucial to manage data access layers and consume cloud resources consistently across agency infrastructures. This panel aims to bring you a collaborative information discussion focused on what may be the best way for agencies to implement public cloud, private cloud, or hybrid multi cloud strategies. Join this webinar as topic experts explore and share strategies that agencies can implement to provide a better experience with the cloud and how they can achieve the full benefits with one in place.

ATARC Federal Cloud Migration Virtual Summit

Presented by and

Tune into this event to hear from federal topic experts on the reason to migrate to the cloud, common migration experiences, and the benefits cloud migration can bring. What lessons have these topic experts learned while making the shift to the cloud? What challenges did they face? What best strategies did they have to put in place to overcome these challenges?

How NOT to Manage a Government Development Project

Presented by

Leading a successful project team is not always easy. One of the many challenges of project management is achieving all the project goals and objectives within the constraints of a specified time. Are development projects getting done on time? Are members of your team excited and motivated about your government project? Join this webinar to learn the tools needed to essentially build an organization from the ground up. Topic experts will cover ways to increase operational efficiencies, reduce security and compliance risks and improve enterprise operations by leveraging a single toolchain.

The Journey to Zero Trust: Start with Privilege Protection & Identity Security

Presented by and

A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls? During this webinar, topic experts and thought leaders will discuss how to manage identity to ensure agencies are aligned with recent policies such as Biden’s Executive Order on Cybersecurity and the NIST 800-207 Zero Trust Architecture.

The Culture of Government IT Modernization

We often start IT Modernization projects focused on technology; however, people and processes are the most critical elements to successful transformation. Technology in the hands of team members who’ve not been trained appropriately to operate it, or consumers not trained to utilize it effectively guarantee failure. This series will explore evolving the culture of our people and teams. Our experts will discuss leadership imperatives as well as individual and team behavior and skills required to cross the divide to successful IT Modernization and in turn digital transformation.

Intelligent Data Management: Next Step in Digital Transformation Journey

Presented by and

Like most businesses and other organizations around the world today, Government agencies are seeking to reduce costs, realize operational efficiencies and deliver better services by using software as a service (SaaS) applications and other cloud solutions to digitally transform the way they operate. Effective data management and governance require leadership support, and being able to augment the right data at the right time requires not only data management but intelligent data management. Do you have a strategy in place to access and get value from your most important data — to protect the data? Tune in to learn how digitally mature your organization is and what your next move should be. 

ATARC 2021 Multi-Cloud Modernization Virtual Summit

Adopting a multicloud strategy means leveraging the strengths of multiple cloud providers – including on-prem and edge cloud technologies – to acquire capabilities that best meet your business and mission requirements. For Federal agencies the rewards can be huge – including more secure, cost-effective and agile IT environments and an optimized workforce. But managing multiple clouds comes with challenges and complexities and the path to multicloud optimization requires a strong strategy, the right investments and patience. With this in mind, many are left wondering is the goal is attainable? And is there really a path to get there?” Tune into this panel, to hear from topic experts on the challenges and complexities they are facing with multicloud, as well as the solutions they have found to overcome them. What strategies would these topic experts recommend to best optimize your multi-cloud environment? How does the multi-cloud affect workforce optimization?

 

ATARC Advancing DevOps Throughout the Federal Government Virtual Summit

Collaboration is important in many aspects of the federal government. When collaboration from different agencies and organizations begin to happen, agencies must take a step back and see the best practices for this to take place. How do we harmonize our DevOps/DevSecOps tools/processes/policies across agencies so integration of the end product is seamless? Listen as topic experts dive into the best strategies for harmonizing DevOps and DevSecOps tools, processes, and policies throughout the Federal Government. What lessons have these topic experts learned while harmonizing these tools, processes and policies?

Protecting Bring Your Own (BYO) Mobile Devices within Zero Trust Frameworks

Presented by

If you are responsible for protecting BYO initiatives within Zero Trust frameworks, please join our webinar to hear:

  • Authors of the NIST practice guide discuss best practices for securing BYO mobile devices
  • Architects at MITRE on how to enhance protection using the MITRE ATT&CK Framework for Mobile
  • Government and industry experts on real-world use cases like the U.S. Department of Defense (DoD) protecting unclassified mobile devices

2021 Cybersecurity Innovations Summit

Presented by

As Federal agencies moved quickly in this past year to put innovative technology solutions into place, the need to strengthen their cybersecurity capabilities and solve increasing cybersecurity challenges have grown even more important. Aligning agency cyber strategies and securely enabling technology infrastructure are even more crucial when coupled with the accelerated transition to remote and hybrid work environments. Agencies have been forced to reevaluate their technology needs and how they can best achieve IT modernization while managing cyber risk in this evolving space. Agency IT boundaries today are blurring with competing demands, from cloud adoption to the expansion of requirements at the edge of the network, and there is an ever-increasing need for the broadest set of visibility, control, and security orchestration tools. Join this panel discussion as leading executives explore securing Federal networks today and in the future, planning for the evolving cyber threat landscape and building a strategy to implement best practices when securing a proliferation of devices and data across networks and in remote locations.

ATARC 2021 Hyperautomation Virtual Summit

New ways of working and sharing information have emerged within the Federal Government. This has pushed agencies to reevaluate their technology needs and develop plans to further their IT modernization strategy. One way in which the Federal Government has gone about furthering their IT Modernization, would be trusting automation. RPA has become an integral part in changing how the Federal Government works, and has started to show the great value it brings to the Federal space.

Edge Computing – A Must for 5G and IOT Success

Presented by

With the rise of remote work it is of the most importance to secure data where it is stored and while it is in flight. Agencies need secure technology infrastructure that can be accessed anywhere, at any time. New data architectures are allowing government employees to securely access data wherever they may be. This past year has shown the need for zero trust data access that enables users to access the data they need to get their jobs done no matter where they are working.

ATARC Emerging Technologies Virtual Summit

Emerging Technologies are evolving at a faster pace than ever before, especially as the workforce pivots to a telework environment. Throughout this panel we will discuss the new and evolving technologies that are driving real change and innovation in the public sector. Topic experts will discuss the future of the Federal workforce, and the emerging technology that will help it get there. How has the shift to telework given the opportunity to reskill the Federal workforce? What emerging technologies have helped with this reskilling process?

ATARC Advancing AI in Federal IT Virtual Summit

This event will explore the current state of technology, use cases, and limitations of Artificial Intelligence, in the Federal Government space. Listen in as Federal Chief Data Officers explain how in this period of time of building the “new normal”, you establish a more consistent and integrated data infrastructure and data practices throughout your agency. What does it mean to strengthen your agency’s data intelligence? Tune in to hear from these CDO’s the challenges, as well as the lessons they have learned while implementing artificial intelligence in their Federal Agency.

Why Agency IT Modernization is Essential for Dynamic Cybersecurity

 Presented by   

Join this webinar to hear from topic experts and learn how agencies are taking new approaches, changing organizational cultures, and building confidence in modernized and secure IT architectures. Take away practical information to leverage the latest technologies for automating processes, improving enterprise security, and satisfying the mobile Federal workforce.

Cyberattacks the Path Forward

 Presented by   

Join this webinar to hear from government and industry thought leaders about the recent cyberattacks, the lessons that were learned, and the path moving forward. The cyber threats faced by the private and public sector call for increased collaboration and cooperation across the IT industry, and with those responsible for defending countries from cyberattacks. Recent cyberattacks highlight the need for enhanced collaboration within the industry to collectively improve how we prevent, manage, and remediate these kinds of threats and operations in the future, and underscores the need for deeper public and private partnerships to create a more secure environment for everyone.

Zoom enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly.