ATARC Virtual Events
Industry SponsorshipPathways to Zero Trust: How Governments Will Secure Digital Frontiers in 2025
February 6, 2025, 1:30 – 2:30 PM ET
This webinar will explore strategies for implementing Zero Trust principles, enhancing cybersecurity, and defending against evolving threats. Learn from experts as they share insights and practical approaches to adopting a Zero Trust framework for stronger organizational security.
Past Virtual Events:
Quantum Speaker Series Presents: Elliptic Curve Cryptography, the Canary in the Quantum Coal Mine
This engaging webinar explored the latest advancements in ECC, its impact on cybersecurity, and how federal agencies can implement this technology to enhance data protection. View this webinar on demand to gain valuable insights from leading experts in the field.
Energizing the Mission with AI
In partnership with
Artificial Intelligence is revolutionizing the way we process and interpret data, offering innovative solutions to long-standing challenges across various sectors. In government, AI is increasingly being leveraged to empower agencies with advanced tools that drive efficiency, enhance self-service capabilities, streamline operations, and manage risk with unprecedented precision. This webinar will bring together top AI and technology executives from federal agencies to share their strategic vision for AI integration.
Assessing the Benefits and Risks of Quantum Computers
Unlock the potential of Quantum Computing in federal innovation at ATARC’s Quantum Computers Summit. Join top industry experts, government leaders, and technology pioneers to explore the latest advancements, applications, and challenges in quantum technology.
Mastering Zero Trust: Leveraging Network Visibility in Zero Trust Frameworks
In partnership with
In this webinar, we will explore key insights from industry leaders and practitioners who have leveraged advanced network monitoring tools to achieve their ZT objectives. Join us for a deep dive into the intersection of network visibility and Zero Trust, and discover how to accelerate your agency’s path to a more secure future.
ATARC Insider Risk: What We’ve Learned, a Year in Review
Join us for an exclusive session featuring the Chairs of the Insider Risk Working Group as they reflect on the key takeaways and lessons learned over the past two years of collaborative efforts. This webinar will summarize our Insider Risk webinar series, offering a comprehensive look at the evolving threat landscape and the strategies developed to mitigate insider threats.
Quantum Computing and Economic Productivity: The Role of Business Model Innovation
Quantum computing takes advantage of the laws of quantum mechanics to provide fundamentally new ways of processing information. In doing so, quantum computing promises societal benefits ranging from a step change in optimization and better simulation of materials to improvements in machine learning capabilities. Based on the experience of previous general-purpose technologies, there is often a steep learning curve to innovate business models to contribute to productivity and economic growth. The talk will explore the opportunities as well as challenges of quantum computing in contributing to productivity growth.
The Fundamentals of Protecting your Paths to Privilege
In partnership with
Despite the long standing principles of Least-Privilege and Privilege Access Management (PAM), 90% of organizations experienced at least one identity-related security incident in the past year. Even with the number of security tools in place, attackers are outflanking them through unidentified attack paths. And AI is accelerating and uncovering paths to privilege faster than we’ve ever seen. In this webinar, our panelists will discuss how many organizations still maintain legacy identity platforms and applications, the types of privilege abuse that can (and does) occur and finally the fundamentals for protecting your paths to privilege and why it requires an identity-centric approach.
Challenges and Approaches: Improving Federal IT Audit Readiness and Outcomes
In partnership with
Federal agencies have to undergo independent audits to demonstrate compliance with Federal IT audit controls from guidelines such as Federal Information System Controls Audit Manual (FISCAM), Federal Information Security Modernization Act (FISMA), Statement on Standards for Attestation Engagements (SSAE), Financial Improvement and Readiness Guidance (FIAR), National Institute of Standards and Technology (NIST) guidance, as well as other Federal audits and general Federal IT Controls. Agencies often struggle to achieve a state of readiness for these audits in terms of minimizing IT findings, improving FIAR compliance, and gaining an understanding of options for remediation of IT findings resulting from the audit.
This webinar discussion will explore the major challenges that they face in improving their level of readiness for such audits and strategies that have improved their operational posture for these audits to minimize the findings and resulting corrective actions.
Quantum Speaker Series Presents: Scaling Quantum Computers Using Light
Once fully realized, quantum computers will solve problems we never thought possible. Building a quantum computer with enough power to solve these problems is one of this decade’s biggest technological challenges. Xanadu is taking on this challenge in its mission to build quantum computers that are useful and available to people everywhere. Xanadu Founder and CEO Christian Weedbrook talks about his quantum computing journey and outlines Xanadu’s roadmap to 1 million qubits using light.
What’s Lurking in Your Phone: Navigating Security Risks in Mobile Apps
In partnership with
Mobile apps, including the ones on your employees’ smartphones used for work, are a great source of sensitive data and are the newest, largest attack surface. Today’s mobile app ecosystem is riddled with potential security vulnerabilities, and as the evolution from Secure by Design to Secure by Demand suggests, it’s not enough to trust that software was securely developed. Organizations, especially government agencies, need to be proactive in preventing mobile app cyberattacks.
Join ATARC and a panel of experts where they will explore emerging mobile app threats, discuss security risks, and provide practical strategies to protect your organization from data breaches.
The Role of Mitigation in Insider Risk Series, Part 3 of 3 – Proactive Risk Mitigation: A Winning Formula for Taking Action
For Insider Threat, mitigations are actions an organization can take to reduce risk to the organization. These actions to be effective need to be informed by the risk you are seeking to mitigate. Simply, your mitigation should be focused on the risk surface. For insider threats we focus on the people, the employees, contractors and supply chain that all can introduce physical, cyber or other destructive behaviors into the work environment.
Significant research has been done to identify leading people risk signals. Dr Shaw codifies how these risk signals if left undetected, uncorrelated or actioned can build to a point where an individual does act out and tragically can cause harm to self, others and or the organization.
Insider risk professionals understand that early discovery of risk signals enables sooner mitigation opportunities. To support this organization must link mitigation to deter and detection strategies. Simply mitigation should not be seen as the end, but part of a continuous process.
Quantum Speaker Series Presents: Quantum Technology Market Update
Hear Alex Challans, CEO of Resonance (owner of The Quantum Insider), will provide an insightful update on the quantum technology market during his talk for the ATARC Quantum Speaker Series. His presentation will delve into recent funding trends, key market shifts, prominent players, and emerging themes within the quantum technology landscape. Attendees will gain a comprehensive overview of the current state and future prospects of quantum technology, informed by Alex’s expertise and industry insights.
Growing Good in Government: The Intersection of IVN and AI
Overview of the Center for Quantum Technologies (CQT)
Quantum technologies are governed by the physics of sub-atomic particles and have relevance to computing, sensing, imaging, metrology, communications, and cryptography. Because of their wide-ranging applicability, quantum technologies have the potential to be transformative, with uses in intelligence, financial security, computing, medicine, and navigation. Society has entered the second quantum revolution, but it is still in its infancy, and the nascent quantum industry requires significant fundamental research to mature novel technologies. In partnership with industrial and government members, the CQT researchers will use their expertise in quantum science and engineering to develop and transfer foundational knowledge into industry-friendly quantum devices, systems, and algorithms with enhanced functionality and performance.
Navigating IT Modernization and Cloud Security
In partnership with
As federal agencies tackle the demands of integrating cybersecurity, cloud security, artificial intelligence, and digital services, they face the complex and evolving challenge of IT modernization. This process is critical and necessary across the Federal Government, with each agency undergoing its unique transformation journey. Cloud security, in particular, plays a pivotal role in this modernization, ensuring that sensitive data is protected while enabling agencies to leverage scalable and flexible cloud solutions. Assisting these agencies in achieving their missions through effective IT modernization and robust cloud security is essential.
The Role of Detection in Insider Risk Series, Part 2 of 3: The Nexus of Technology in Support of Internal and External Human Risk Signals
Recent public comments by the directors of the FBI, CIA, and DCSA around the troubling call to action for those whose crisis of conscience, moral outrage put them on a path to radicalization and potential engagement in destructive actions. Globally and locally within our own cities there is a growing disgruntlement and perceived marginalization of individuals. These individuals, who make up our workforce and supply chain, are being targeted by external bad actors or simply zeroing in on the organizations or companies they work for as the root cause of their grievance.
Optimizing Operations: Gen AI in Federal Agencies
In partnership with
Gen AI is revolutionizing the federal government by enhancing efficiency, decision-making, and service delivery. This webinar explores its diverse applications, from automating administrative tasks and analyzing vast datasets to improving cybersecurity and developing predictive models.
Beyond Traditional Boundaries: Modernizing PIV/CAC Authentication
In partnership with
In this webinar, panelists will describe their agency’s progress and challenges in leveraging PIV/CAC and the PKI credentials embedded within as the primary identity authentication mechanism for federal enterprise users. They will discuss the trend of agencies implementing additional (often weaker) authentication techniques to support a variety of use cases that PIV/CAC do not readily support. They will also discuss their agency vision with respect to leveraging FIDO2 credentials, and specifically, Derived FIDO2 Credentials to address multiple authentication use cases and the benefits and challenges of such implementations.
Quantum Speaker Series Presents: PQC Roadmap
Join ATARC’s Quantum Speaker Series for the “PQC Roadmap” event. Christian Lowry and Dr. Garfield Jones from CISA will discuss the risks and strategic technologies related to post-quantum cryptography and critical infrastructure. Engage in an open Q&A session to delve into emerging technological threats and protective measures. Register now to secure your spot and gain insights into the future of cybersecurity.
Zero Trust in Action: Approaches to Mobile Security and Threat Intelligence
In partnership with
Discover how mobile security plays a pivotal role in enhancing the efficacy of a Zero Trust Architecture, providing rigorous verification mechanisms to ensure the integrity of user and device access to critical resources. From identity theft to sophisticated malware, the risks posed by mobile devices are diverse and constantly evolving.
Growing Good in Government Initiative – A Recap from the University of Maryland Project Management Symposium
The G3I seeks to address multifaceted problems by instituting a coherent and integrated approach that unifies and optimizes the various elements of government operations to ensure that they collectively contribute to delivering sustainable benefits to the American public. Through G3I, the goal is to reinvigorate our organization’s ability to collaborate in fulfilling its mandate in the most impactful and enduring way possible.
Assuring Change: Infusing Zero Trust into Existing Government Cybersecurity
In partnership with
By addressing implementation hurdles head-on and fostering a ZT culture within agencies, government entities can adapt to the evolving threat landscape with confidence, resilience, and a steadfast commitment to safeguarding critical assets and information. From legacy systems to modern architectures, panelists will share strategies for overcoming implementation hurdles and achieving Zero Trust maturity.
Join us for a comprehensive exploration of ZT implementation strategies tailored to the unique needs and demands of government agencies.
Quantum Algorithms: A Survey of Applications and End-to-End Complexities
In this talk, we present examples and comment on takeaways identified in our larger survey of quantum algorithms and applications (arXiv:2310.03011). We discuss several potential application areas of quantum algorithms and their underlying algorithmic primitives, carefully considering technical caveats and subtleties to understand the “end-to-end” resource requirements of the application, and how it compares against state-of-the-art classical methods.
Delivering Decision Advantage: Use of Intelligence
In partnership with
Navigating the Landscape of Decision Advantage: Dive into a discussion with experts on how the fusion of Decision Intelligence and Decision Support empowers decision-makers, offering insights into resolving crises and strategically leveraging national power to gain a decision advantage in complex scenarios.
The Role of Deterrence of Insider Risk Series, Part 1 of 3
This webinar (1 of a 3-part series) will focus on deterrence, a continuous function, and critical component of a successful Insider Risk Program.
Our panelists will discuss the challenges and effectiveness of the “5 Cs” of an Insider Risk Program: Communication, culture, character, compliance, and consequences.
Tune in as topic experts explore the methods and solutions agencies are employing to navigate this dynamic environment and sustain peak performance amidst rapid technological change.
Optimizing Human Performance in Tech Evolution: Govt. Agencies’ Mission Readiness
In partnership with
In today’s rapidly evolving technological landscape, government agencies face the daunting task of managing advancements in AI, cybersecurity, and more, while ensuring their workforce remains at the peak of performance. In the realm of agency operations, there are a multitude of challenges that arise, with increasing complexity and declining mental well-being among employees standing out as particularly significant risks to mission success.
Tune in as topic experts explore the methods and solutions agencies are employing to navigate this dynamic environment and sustain peak performance amidst rapid technological change.
Securing the Identity Fabric in the Age of Cloud and Zero Trust
In partnership with
Securing government agencies against cyber threats is paramount in today’s digital age. This webinar introduces two FedRAMP High Authorized solutions, CyberArk Identity and Endpoint Privilege Manager (EPM), designed to meet and exceed rigorous government security standards. This session will showcase how these integrated solutions fortify agency defenses and streamline operational efficiency. Join our panelists as they explore real-life applications of CyberArk’s tools in bolstering government cybersecurity postures and preparing agencies to tackle present and future digital challenges efficiently.
The 1st NIST PQC Standards
Eight years ago, the National Institute of Standards and Technology (NIST) initiated a public process to select quantum-resistant public-key cryptographic algorithms for standardization. NIST issued the public call for submissions to the PQC Standardization Process in December 2016 and, after three rounds of evaluation and analysis, selected four algorithms for standardization: CRYSTALS-KYBER, CRYSTALS-Dilithium, FALCON, and SPHINCS+. In this talk we will discuss the three current NIST PQC endeavors: drafting standards for the selected algorithms, the remaining algorithms under consideration in the 4th round of evaluation, and the call for additional digital signatures to be considered for future standardization.
Advanced Threat Protection for Government Infrastructure
In partnership with
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security solutions can effectively counter these threats, empowering agencies to proactively identify and prevent cyber disasters.
Integrated Value Network (IVN), More Examples
How might we implement the Integrated Value Network (IVN) framework in the wild? Our first challenge is to communicate what data is available and how it answers basic questions; we will do this by addressing key themes from the January kickoff survey. Hear from invited panelists as they discuss their use cases to address policy challenges using this “Moneyball” approach. We invite attendees to share their ideas and implementation of the framework. As time permits, the webinar will close with highlights from the April 2024 UMD Program Management Symposium.
Securing Success: RMF and Zero Trust Unleashed
In partnership with
The reality is that cybercriminals are more sophisticated than ever before, meaning that the ability to defend, respond, and recover from a cyber event requires support across the organization. Neither IT nor security can cope alone. This panel will discuss the importance of resilience in today’s digital world and examine how to build a foundation for effective risk management throughout organizations.
Join ATARC and government and industry experts for a discussion about the strategies and technologies essential for protecting containerized applications against the unknown — specifically, zero-day exploits and active threats. Panelists discuss runtime controls, Zero Trust policies, and steps that can be taken to ensure that every component of your container ecosystem is continuously verified and secured.
Investigating the Needs, Opportunities and Challenges of Interfacing Quantum Computing with HPC
This talk outlines user-centric motivations and requirements that drive the development of technologies for full-stack interfacing and integration of quantum computing platforms with HPC systems from hardware, software to applications and skills. European activities driven through the EuroHPC Joint Undertaking as well as global activities such as the IEEE Quantum-HPC Working Group was presented alongside the technological challenges and R&D collaborations that are ongoing.
Intelligent Data: The Key to Cyber Resilience
In partnership with
This session dove into thought leadership and best practices for leveraging intelligent data to fortify your defenses, manage risks, control costs, and ensure readiness aligned with your mission. Adaptability and flexibility are key in addressing evolving threats in the digital age.
Tune into this webinar to hear Federal IT experts explore strategies to leverage intelligent data to fortify your defenses, manage risks, control costs, and ensure readiness aligned with your mission. In the dynamic digital landscape, adaptability and flexibility are paramount in effectively addressing evolving cyber threats.
Unlocking Cyber Readiness with SBOMs
In partnership with
The cybersecurity landscape has undergone significant transformations resulting in compliance regulations mandating the adoption of the NIST Secure Software Development Framework framework, with a special emphasis on implementing a Software Bill of Materials (SBOM). In this discussion, we will explore the importance of perceiving cybersecurity as a mission-centric challenge that extends beyond mere compliance checklists.
Join us as we discussed key topics such as zero-day vulnerability management policies and continuous monitoring for all deployed software.
The Use of Artificial Intelligence AI in Insider Risk Programs: Part II – Promise and Peril
Experts examine how AI supports Insider Risk programs in various sectors. They cover AI’s role in threat detection, showcasing positive outcomes and effective integration strategies into organizational cultures. Additionally, the webinar addresses common misconceptions about AI and provide guidance on building trust and transparency within organizations.
Climbing the Mountain: A New Era for Government Cybersecurity
In partnership with
Dive into the forefront of government cybersecurity by being a part of this conversation! Join industry experts and thought leaders explore the latest challenges and opportunities in safeguarding critical digital infrastructure. From emerging threats to innovative solutions, this event promises insightful discussions and practical strategies for enhancing cybersecurity resilience.
Strangeworks: Accelerating Innovation through Quantum Computing & AI
This talk focused on the powerful intersection of quantum computing, AI, and scientific exploration. We began with an overview of Strangeworks, an advanced compute software company removing the barriers to utilize quantum, quantum-inspired, and classical technologies. We then discussed our recent work on quantum for solving optimization problems, and showcase our upcoming AI developments designed to make the capabilities of advanced compute more accessible.
Integrated Value Network (IVN), An Introduction
Our session began with a quick recap of the Integrated Value Network (IVN) by our expert team, followed by a lively panel discussion exploring its applications and potential. Audience participation is encouraged through a brief Q&A, and we’ll wrap up with a captivating live demonstration showcasing the practical applications of the IVN in real-world scenarios. Join us for an engaging session that combines informative insights with interactive discussions and live demos, exploring the transformative possibilities of the IVN.
Rise of the Machines! Zero Trust Considerations in an AI-Enabled Enterprise
In partnership with
In today’s world, we’re constantly hearing about new tech terms and breakthroughs, from artificial intelligence (AI) to Zero Trust security. Government organizations are always trying to keep up, looking for quicker and smarter ways to get things done and keep their information safe. This webinar will talk about how the Zero Trust approach can help. Zero Trust means not taking safety for granted, no matter if someone is working inside or outside the company’s network. Panelists look into how adopting Zero Trust can make a secure foundation for using new tech now and in the future, helping businesses stay safe and ahead of the curve.
Report of Quantum Potential – The Responsible Adoption of Quantum Technologies
A presententation and overview of a report for the Canadian Council of Academies on what opportunities and challenges do quantum technologies present in light of current trends affecting their evolution? In particular, the focus will be on the following three questions: What does the current evidence and knowledge suggest regarding promising and leading practices that could be applied to drive and accelerate the adoption of quantum technologies? What are the enabling conditions to ensure broad access to and market readiness for quantum technologies? What are the main socio-economic, regulatory, and ethical challenges related to the adoption of quantum technologies?
The Identity Catalyst: Accelerating Zero Trust with AI Innovations and your CDM Foundation
In partnership with
A decade ago, the Continuous Diagnostics and Mitigation (CDM) Program put agencies on the right path with critical investments in identity and access automation, but technology hasn’t stood still. Today, the Federal Zero Trust Strategy aims to accelerate cyber maturity throughout the government and secure our nation’s future. At the same time, relentless innovation in Artificial Intelligence is changing the game for attackers and defenders alike.
This compelling discussion explores these top-of-mind topics: 1 ) How to advance your Zero Trust architecture atop an existing CDM foundation, 2) What AI innovations are empowering our nation’s cyber defenders, 3) Why modern Identity with AI is the catalyst for optimal Zero Trust maturity
Codeless Live Build Challenge
In partnership with.
ATARC’s first virtual Live Build challenge! Teams will be tasked with building an innovative application in real-time using Unqork’s codeless development platform. Applications showcased how the government can leverage codeless development to rapidly drive impactful mission modernization.
Audience was shuffled through each team’s room as they build, with an opportunity to watch and ask questions. The Audience will return to the main room for a demo of each team’s solution.
*Videos to come*
2024 Vision: Elevating Federal Security with Cloud Tech
In partnership with
The importance of implementing an intelligent cloud approach that not only enhances user intuitiveness but also significantly reduces the risk of breaches is crucial. Move beyond operational inefficiencies caused by fragmented solutions and discover how to streamline security measures across the entire application lifecycle. Breaking free from operational inefficiencies caused by fragmented solutions is at the forefront of public and private sector leaders as we enter the new year. Tune in to hear Federal topic leaders peer into the future of innovation within this AI-powered landscape and share insights on staying ahead of the curve.
21st Century IDEA: Leveraging Modernization to Deliver a Digital-First Public Experience
In partnership with
Join us in this conversation where we delved into the impactful initiatives supported by the Technology Modernization Fund (TMF). The TMF focuses on investing in cutting-edge projects in cybersecurity, data protection, interoperability, legacy system upgrades, and digital experiences. Discover how TMF plays a crucial role in implementing innovative information technology (IT) solutions across the government, enhancing agency processes, using taxpayer dollars more efficiently, and delivering straightforward, seamless, and secure experiences to the American public. Don’t miss the opportunity to explore the transformative potential of TMF-backed projects in shaping the future of government IT.
Mission Driven Observability: Enhancing Security, Compliance, and Efficiency
In partnership with
Federal agencies need more support to implement modern monitoring tools that help improve their threat detection and response. But how can agencies achieve the resilience required for today’s cyber threats? It starts with prioritizing an observability strategy.
In this webinar, experts will discuss the importance of an observability strategy to improve SIEM performance and costs, optimize security information and event management, and how to comply with Federal Mandates including M-21-31.
Quantum Information Science at AFRL
This talk will summarize the AFRL Quantum Information Science program covering timing, sensing, networking and computing. Six of the nine AFRL tech directorates have active R&D programs in this strategically important area. Research timelines and operational impact will be discussed. Partnership opportunities through the Innovare Advancement Center will also be highlighted programs.
The Use of Artificial Intelligence (AI) in Insider Risk Programs
In this webinar, the ATARC Insider Risk Working Group will explore the use of AI in support of insider risk programs in Government, Industry, and Academia. Panel members will discuss the emergence of AI as a critical tool that has the power to enable and modernize insider risk programs.
The panel will also discuss communicating AI, how to ensure programs do not become overly reliant on its use, and the guard rails necessary to control the use of AI in insider risk programs. The webinar will also explore several other AI-related topics ranging from the use of data, contextualizing products generated from AI, and reducing potential negative consequences of AI. This is the first of a multi-part webinar focused on AI in insider risk programs.
Quantum Leap: Space, Energy, and Collaborative Innovation
Discussing Artificial Brain’s current work with quantum annealing technologies, presenting benchmark results demonstrating quantum’s ability to solve immediate human challenges, while also working to accelerate the transformation of key sectors in rapid transition, such as space and sustainability.
Dana Linnet is Senior Executive for Market Engagement at Artificial Brain USA. Dana is a former senior U.S. Government official and diplomat. Since leaving government she has served as a defense and aerospace executive at Lockheed Martin, Sales Director and Senior Advisor at Guidehouse LLP’s National Security Sector, and Global VP at a Silicon Valley AI start up. She’s also the CEO of The Summit Group DC a consulting firm specializing in Space, NetZero and Defense and Emerging Technologies.
FedRAMP Rev 5 and Beyond:
Your Key to Secured Cloud Systems and Applications
In partnership with and
Since its launch in 2011, FedRAMP has become the best practice for selecting, deploying, and managing cloud systems and applications in the U.S. Federal Government. And in January 2023, the FedRAMP Authorization Act made FedRAMP the law of the land!
Don’t miss this strategic webinar to learn about the new release of FedRAMP and where FedRAMP is headed in 2024 and beyond. If you are a federal civilian or defense agency, a state and local government seeking to improve its cloud adoption, or a cloud services partner supporting governments, you will want to see this webinar live and be part of the discussion.
Partnerships in Cybersecurity Education and Workforce Development
Cybersecurity education and workforce development is a significant issue given large current national capability and skills gaps. In this webinar, we bring together key partners and major stakeholders from the public sector, private sector, and academia to discuss pathways of collaboration and partnerships moving forward to solving this important problem. Panel members will discuss their experience and “best practices” to reduce these capability gaps and assist with the preparation of a new generation of skilled cybersecurity and AI professionals.
A Look at Evolving Insider Risk Programs
Insider Risk Programs have continued to evolve naturally over the past 20 years. They have grown exponentially beyond the traditional lens of trying to identify spies through cyber-focused data exfiltration events.
In this webinar, we talked with experts who have guided these changes and who are still seeking to drive change across the insider risk mission space.
Quantum Speaker Series Presents: Export Control Landscape for Quantum Technology
Participate in an insightful panel discussion as we delve into the crucial topic of federal software supply chain modernization and compliance standards for Software Bill of Materials (SBOMs) in line with The President’s Executive Order 14028. This webinar aims to address the challenges faced by federal agencies, share best practices, explore avenues for improving efficiencies, and establish a compliance standard for SBOMs in the software supply chain.
Using NIST Guidance to Manage Security of Mobile Devices
In partnership with
Mobile devices are an integral part of an efficient workplace and securing them has become a prevailing concern for individuals and organizations, given their widespread use and the sensitive data they contain. To address these concerns and to provide guidance on how mobile devices can be protected, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for managing the security of mobile devices throughout the Enterprise Mobile Lifecycle. The standard offers a holistic approach to mobile device protection guidance, covering mobile threat defense, application vetting, centralized device management, endpoint protection technologies, and looks at both organization-provided and bring-your-own-device scenarios.
Identity Governance; A Critical Enabler of Zero Trust
In partnership with
Office of Management and Budget (OMB) Memorandum M-22-09 requires “agencies to achieve specific zero trust security goals” and designates “Identity” as the first of five pillars from CISA’s zero trust maturity model. Additionally, M-22-09 provides specific actions for the Identity pillar that include, employing centralized identity management systems that integrate with agency applications and platforms; leveraging phishing-resistant MFA throughout their enterprise; and using device level signals along with other data for access authorization decisions.
Identity governance involves managing roles, segregating duties, performing analytics, maintaining logs, and generating reports. These components collectively enable organizations to manage access to organizational resources to promote mission accomplishment while mitigating risk. This webinar will focus on the opportunities and current challenges in using identity governance approaches to enable the achievement of zero trust cybersecurity goals. Panelists will discuss the current or envisioned use of identity governance methods and tools within their organization and share lessons learned for the identity pillar on their journey towards zero trust.
Growing Good in Government by Building the Feedback Loops of the Future
In partnership with and
In an era where rapid technological advancement is reshaping industries, the public sector stands at a pivotal juncture. The Growing Good in Government Initiative (G3I) emerges as a beacon for this transformational journey, striving to usher federal agencies into the age of digital and artificial intelligence.
This panel discussion delves deep into the heart of G3I, unpacking its strategic objectives, the role of self-organized teams, and the initiative’s overarching vision to rejuvenate governmental processes. Bringing together key stakeholders, experts, and pioneers of the initiative, the discourse will illuminate the challenges and triumphs of implementing such a transformative strategy in a bureaucratic setting.
Quantum Speaker Series Presents: Optimization Landscape Using Quantum Computers
The Future of Cloud: Modernizing and Migrating
In partnership with and
In partnership with and
Alex Khan is an advisor, entrepreneur, author and educator in quantum computing. He is CEO of ZebraKet, a Canadian startup in leak detection and sensor optimization using quantum methods and AI. He is the author of “Quantum Computing Experimentation with Amazon Braket”. He presented a brief tour of various real-world optimization use cases and realities of solving them on current quantum devices and other quantum inspired solvers.
As cloud adoption accelerates, we’ll discuss potential concerns related to exclusive reliance on Cloud Service Providers (CSPs). Discover strategies to maintain solution diversity, reducing dependency on a single vendor and ensuring a robust cloud ecosystem.
This engaging session offers firsthand perspectives from leaders shaping cloud migration strategies, all while managing security complexities. Don’t miss this opportunity to grasp the intricacies of modernizing government operations through strategic cloud integration.
AI Bill of Rights Framework: Safe and Effective Systems & Human Fallbacks
In October 2022 the Office of Science and Technology Policy (OSTP) released their “Blueprint for an AI Bill of Rights”, intended to inform and shape the development of federal AI policy. In response, ATARC is hosting a series of webinar panels to promote discussion and provide clarity on the Blueprint’s structure and goals.
These panels will bring together government leaders, academics, and researchers, with the hope that these discussions will further the effective implementation of US federal AI policy. Our third panel discussing the Blueprint will focus on the “Safe and Effective Systems” and “Human Fallbacks” Pillars.
America’s Software Supply Chain: How Secure Are We?
In partnership with
Strengthening the accessibility of the Federal government’s resources by reducing barriers and streamlining the processes are only two of the proposed strategies to reinforce the customer experience. This can be completed with modernization of programming, reducing administrative burdens, and utilizing new tools and technologies to offer a more simple and secure customer experience. Tune into this webinar to hear experts discuss the first steps in addressing the new customer experience requirements, what infrastructure needs to be in place to ensure that the American public is receiving the best care, and what are some emerging technologies that will aid in fulfilling these new goals?
Strengthening Federal Software Infrastructure: Importance of SBOM Compliance Standards
In partnership with
Participate in an insightful panel discussion as we delve into the crucial topic of federal software supply chain modernization and compliance standards for Software Bill of Materials (SBOMs) in line with The President’s Executive Order 14028. This webinar aims to address the challenges faced by federal agencies, share best practices, explore avenues for improving efficiencies, and establish a compliance standard for SBOMs in the software supply chain.
Zero Trust: Driving Transformation and Modernization in Federal Cybersecurity
In partnership with
Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize their ZT plans and get the most out of this forward-thinking architecture.
Elevating Benefits Management: Redefining Customer Experience
In partnership with
Strengthening the accessibility of the Federal government’s resources by reducing barriers and streamlining the processes are only two of the proposed strategies to reinforce the customer experience. This can be completed with modernization of programming, reducing administrative burdens, and utilizing new tools and technologies to offer a more simple and secure customer experience. Tune into this webinar to hear experts discuss the first steps in addressing the new customer experience requirements, what infrastructure needs to be in place to ensure that the American public is receiving the best care, and what are some emerging technologies that will aid in fulfilling these new goals?
How Low Code Empowers and Strengthens the Federal Workforce
In partnership with
Advancing the federal government’s digital evolution necessitates a collaborative effort beyond IT professionals, involving every employee in streamlining processes to enhance efficiency. With a mission-focused and increasingly tech-savvy federal workforce, leveraging low code technologies emerges as the perfect approach to rapidly develop applications that drive immediate improvements in government operations. Tune into this panel to listen to IT, mission, and technology experts explore the transformative potential of low code in expediting the digital government landscape. This discussion will address the implementation of necessary governance, controls, and training to support and scale resulting solutions across the entire enterprise.
Securing Access to Data: An Exploration of ICAM and ABAC
In partnership with
In today’s interconnected and rapidly evolving digital landscape, ensuring secure access to sensitive resources is of paramount importance. There are various methods of securing data and Federal agencies have explored a majority of them. In this panel, Federal experts will help provide a comprehensive understanding of ICAM and ABAC and their potential to address access control challenges in today’s digital landscape. They will also touch on valuable insights into practical implementation strategies and future directions for these frameworks, enabling them to make informed decisions in designing and deploying effective access control solutions within their organizations.
Breaking Silos: Advanced Analytics for Government with Enterprise Data Graphs
In partnership with
Join us as topic experts discuss the benefits of employing analytical techniques and software platforms designed for exploring and modeling complex networks of interconnected data tools for enterprise-level data analytics in government organizations. We will highlight the advantages of graph-based data modeling, which allows agencies to represent complex relationships between data points in a way that is both intuitive and highly efficient. Additionally, we will discuss emphasizing the importance of real-time analytics, which enable government organizations to make rapid decisions based on the latest data.
AI Bill of Rights Framework: Notice and Privacy
In October 2022 the Office of Science and Technology Policy (OSTP) released their “Blueprint for an AI Bill of Rights”, intended to inform and shape the development of federal AI policy. In response, ATARC is hosting a series of webinar panels to promote discussion and provide clarity on the Blueprint’s structure and goals. These panels will bring together government leaders, academics, and researchers, with the hope that these discussions will further the effective implementation of US federal AI policy. Our second panel discussing the Blueprint will focus on the “Notice” and “Privacy” Pillars.
Elevating Benefits Management: Redefining Customer Experience
In partnership with
Strengthening the accessibility of the Federal government’s resources by reducing barriers and streamlining the processes are only two of the proposed strategies to reinforce the customer experience. This can be completed with modernization of programming, reducing administrative burdens, and utilizing new tools and technologies to offer a more simple and secure customer experience. Tune into this webinar to hear experts discuss the first steps in addressing the new customer experience requirements, what infrastructure needs to be in place to ensure that the American public is receiving the best care, and what emerging technologies that will aid in fulfilling these new goals.
Protecting Critical Infrastructure with Quantum-Resistant Cybersecurity
In partnership with
Modern cybersecurity measures such as post-quantum cryptography (PQC) and zero trust architecture (ZTA) are essential to protect U.S. critical infrastructure and ensure a resilient nation. And with a flurry of comprehensive initiatives coming from the Executive Branch, Pentagon, NSA, and NIST, it can be challenging for U.S. government CIOs and CISOs to determine where to prioritize resources. But PQC and ZTA aren’t mutually exclusive: effective, agile cryptography forms the basis of zero trust principles and eases PQC adoption.
Streamlining Security Authorization through OSCAL Automation
Presented by
Federal agencies must undergo the complex and laborious process of security authorization to operate (ATO) for each information system (IS) in accordance with the Federal Information Security Modernization Act (FISMA). Currently, most agencies rely on manual documentation processes. These include popular productivity tools to capture the applicable security controls and the status/plans of implementation of the controls for each IS as well as an enterprise Governance, Risk and Compliance (GRC) tool for documentation repository and ATO tracking purposes. This webinar will focus on the opportunities and current challenges in leveraging OSCAL and integrating OSCAL-based ATO processes gradually into agency FISMA processes.
Cyber Resilience for Modern, Agile, and Trusted Agency Environments
Presented by
Today’s cybersecurity threat landscape means Federal professionals must take a proactive and practical approach to defending agency personnel, systems, networks, and data. IT infrastructures need resiliency that is built in, understood by the workforce, and prepared to work beyond the next threat. Creating a resilient IT architecture is not an admission of anticipated defeat. Rather, it’s insurance against probable events and incidents that could compromise government operations and mission integrity. Plan to attend this interactive dialogue to learn how organizational and technical resilience combine to keep agencies prepared and responsive to mitigate cyberattacks—whenever and wherever they occur.
AI Bill of Rights Framework: Algorithmic Discrimination
In October 2022 the Office of Science and Technology Policy (OSTP) released their “Blueprint for an AI Bill of Rights”, intended to inform and shape the development of federal AI policy. In response, ATARC is hosting a series of webinar panels to promote discussion and provide clarity on the Blueprint’s structure and goals. These panels will bring together government leaders, academics, and researchers, with the hope that these discussions will further the effective implementation of US federal AI policy. Our first panel discussing the Blueprint will focus on the “Algorithmic Discrimination” pillar, especially its concerns and protections.
Accelerating Zero Trust with Complete IT Asset Visibility
Presented by
To advance Zero Trust mandates, federal IT leaders need an accurate, trusted, and complete picture of their entire IT estate. Attend this webinar to learn how your agency can better comply with OMB’s January 2022 memo, M-22-09, Moving the U.S. Government Toward Zero Trust Cybersecurity Principles. Learn the importance of validating and enriching their IT asset data against industry-leading libraries and data sets to ensure their situational awareness is trusted, complete, and current. Join our webinar to hear from experts how you can build the critical foundation of IT visibility for your agency’s Zero Trust program.
Tradewind Solutions Marketplace
The Tradewind Solutions Marketplace has been making waves since it launched on Nov 1, 2022. Since then, countless companies have submitted solutions videos for assessment. Many of those videos have been deemed awardable and have been placed into the Marketplace — ready to be purchased by the Government. The Tradewind Solutions Marketplace team is determined to continue spreading the word about how the Marketplace can help industry, academia, and individual innovators get in front of eager Government buyers. Join for an inside look into the Marketplace, along with all the tips and tricks you’ll need to be successful!
Quantum Speaker Series Presents: Overview of the Center for Quantum Technologies
The Center for Quantum Technologies (CQT) is an NSF-funded Industry/University Cooperative Research Center (IUCRC) and a partnership between Purdue University, Indiana University, and the University of Notre Dame, and also several industry and government members. The mission of the CQT is to collaborate with industry and government stakeholders to identify compelling needs and challenges in quantum technologies, and then develop novel solutions to address these opportunities. This talk will give an overview of the IUCRC model and detail the CQT mission and vision.
Navigating cATO Challenges in the Federal Government: Best Practices and Strategies
Presented by
Join our thought leadership webinar to learn about the current operational challenges that federal agencies face on their journey to cATO and how to address them effectively. In this session, we’ll delve into the common challenges of proving compliance, vulnerability management and reporting, and assessing control effectiveness. We’ll provide real examples into best practices to address those challenges. Our panel of experts will provide actionable insights for developers, program managers, CIOs, CISOs, CTOs, Authorizing Officials (AOs), and security professionals on how to move from a paperwork-based approach to a risk-based approach.
Using Conversational AI with Complex Government Information
Presented by
Hear from experts about the value of using Conversational AI within government agencies to improve (a) accuracy in information retrieval, (b) control of training data and responses, and (c) how to build trust with users. Plus, learn how your organization can implement AI quickly, deploy multimodal conversational UX to navigate complex information, and do it cost-effectively. Don’t miss this opportunity to gain valuable insights into how Conversational AI can help streamline, automate, and enhance information access within the Federal Government.
Tradewind Solutions Marketplace
You have heard all the buzz about the Tradewind Solutions Marketplace. But do you know the inside tricks to getting your solution into the Marketplace? Join us for a panel of Marketplace insiders who will give you the best tips on submitting an awardable submission on your first try! Panelists will share lessons learned from the first few rounds of assessments and reveal what made awardable submissions stand out from the crowd. They will also cover the top reasons why some submissions were deemed “non-awardable” and discuss the “Top 5” ways to ensure a winning submission!
Risk Management: A Group Effort
Presented by
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. The reality is that cybercriminals are more sophisticated than ever before, meaning that the ability to defend, respond, and recover from a cyber event requires support across the organization. Neither IT nor security can cope alone. This panel will discuss the importance of resilience in today’s digital world and examine how to build a foundation for effective risk management throughout organizations.
DevOps Hurdles in 2023 and How to Overcome Them
One way or another, at the start of 2023, it’s apparent there are more hard DevOps questions than ever that need to be asked and answered. At this webinar, we invite experts and thought leaders in the field to discuss what obstacles remain in the way of true DevOps transformation, and how to best break down those barriers. What shifts should be prioritized for most gains – change in mindset, digital technologies, to further the DevOps Transformation Roadmap?
Fraudulent Behavior and How Identity Management Can Assist
Presented by
As identity theft is at an all time high, it is imperative that people understand how attacks happen and what they can do to lower risk of being targeted. The Federal Government has created ways to help identify fraudulent actions and developed ways to integrate ICAM strategies to help find and deny the attacks. Listen to thought leaders as they delve into ways to recover from successful fraud attempts and how important it is to establish a strong ICAM system.
Tactics for Web App Security Using Zero Trust Architecture
Presented by
Join this webinar for tactical guidance that includes which pillars are most critical to focus on for AppSec, especially when integrating and automating vulnerability management across the software development lifecycle. Learn about the steps agencies can take to create an action plan following the DoD’s ZTA guidance, as well as guidance from the Cybersecurity & Infrastructure Security Agency (CISA). Hear how modern AppSec tools can assist with providing greater visibility into an agency’s overall risk posture, including analytics that provide deeper guidance. Lastly, learn why automation is vital for vulnerability validation, and how modern AppSec tools can help with orchestration for smoother workflows and processes.
Quantum Speaker Series Presents:
NSM-10 and the Transition to Post Quantum Cryptography – Dylan Presman, Office of the National Cyber Director
The Office of the National Cyber Director (ONCD), the Executive Office of the President’s newest policy office, has extensive responsibilities under National Security Memorandum-10. NSM-10 outlines the Administration’s plans to take advantage of the opportunities offered by emerging quantum technologies while simultaneously protecting the nation from threats posed by quantum technology. On the threat side, NSM-10 recognizes that while sufficiently mature quantum computers are probably still 20 years away, most classified information requires protection for 25 years and sensitive personal data can have a lifespan that is even longer. As such, NSM-10 requires Federal agencies begin their transition to quantum safe cryptographic systems. As a first step, NSM-10 requires Federal Agencies to inventory their most critical cryptographic systems by May 4. The EOP will release specific instructions to Federal Agencies on inventorying cryptographic systems and developing cost estimates for this transition, by mid-February.
SCRM: MITRE’s System of Trust: Supply Chain Assessment Synergy Consistency and Evidence-Based
Hear from Robert A. Martin a Senior Principal Engineer at the MITRE Corporation. This presentation explores the details of System of Trust (SoT), a community effort to develop and validate a process for integrating evidence of the organizational, technical, and transactional trustworthiness of supply chain elements for decision makers dealing with supply chain security. This framework defines, aligns, and addresses the specific concerns and risks that stand in the way of organizations’ trusting suppliers, supplies, and service offerings. Importantly, the framework offers a comprehensive, consistent, and repeatable methodology that is based on decades of supply chain security experience, deep insights into the complex challenges facing the procurement and operations communities, and broad knowledge of the relevant standards and best practices.
Growing Trends and How to Accelerate Mission Impact in 2023
Presented by
Government efforts to modernize saw substantial advancements in 2022: An overwhelming 91% of federal IT workers report their agencies have gained ground on digital modernization efforts in the past year, according to a recent survey of federal employees conducted by Wakefield Research on behalf of ICF. But while optimistic, these employees say their work is far from done. Just 30% have achieved continuous improvement in their modernization journey, leaving 70% still working to meet their goals. Join us as government and industry leaders discuss 2022 learnings, growing modernization trends, and what agencies need to know to accelerate mission impact in 2023.
New Cyber Threats & Recoveries in 2023 Data Security
Presented by
A focus on strengthening our cybersecurity workforce should be at the forefront of every agencies’ 2023 goals. The cyber workforce must evolve to address the challenges posed by our adversaries and meet strategic mission requirements, while also doing an exemplary job at managing data security. This requires agencies to reshape their understanding of what data security entails and how the future of cyber security must include prioritizing data security. Effective cybersecurity workforce development, alongside a shift in focus on Zero Trust Paradigms, should be the goal of every agency.
Tradewind Solutions Marketplace
Presented by
Join us for a webinar presentation on how the Tradewind Solutions Marketplace can be leveraged to find solutions for your Agency. Learn about the Marketplace’s rapid-acquisition features, and hear how the Marketplace is helping Government customers find solutions to their most pressing AI/ML, digital and data analytics problems.
Enhance and Extend: Zero Trust Principles and Identity Management
Presented by
A Zero-Trust approach to security allows for a defensible architecture in a new environment. ZT does not mean ripping out existing infrastructure and replacing it with the newest trend. ZT relies on the ability to enhance and extend your existing security protocols. Listen in as topic experts explore how legislation has pushed their agency to modernize and any hurdles they’ve had to face. This session will also include discussion of the roles of Zero Trust and identity practices.
Shifts and Transitions of AI and Data Analytics in Federal Government
Presented by
Over the past three years, federal IT has been forced to transition and shift as we face new challenges with hybrid work, the COVID-19 pandemic, and supply chain issues. While we’ve faced challenges, new and emerging technologies have assisted in overcoming hurdles of integrating, updating, and training new and current employees on AI and leveraging data as a strategic asset. Hear government and industry leaders explain the challenges they’re facing and the solutions they’re deploying to address them. Where do these federal leaders see the future of AI and data analytics heading? What does it mean to strengthen your agency’s AI and data posture?
SCRM: The Cybersecurity Executive Order 14028 and Upcoming FAR Rules
Hear from Kelley Artz, the Supply Chain Risk Management Technical Lead at GSA as she disccuses the EO and how it is broad in scope, addressing many of the challenges faced with securing information and operational technology systems. As the Federal Government continues to move closer to proactive threat management, there are various ways you can help prepare to implement changes: Keep abreast of proposed updates to the FAR (Federal Acquisition Regulation), Anticipate potential future solicitation refresh and/or mass modification or manual modification of contract language to reflect guidance from National Institute of Standards and Technology) NIST, Cybersecurity and Infrastructure Security Agency (CISA) and/or GSA, Watch for GSA guidance and updates, Attend training sessions as they become available.
Steps for Acquiring and Implementing AI: Challenges and Successes
Presented by
Choosing the best AI strategy & approach can be a long challenge as technical capabilities, governance, and administration, as well as requirements for security, privacy, civil rights, and civil liberties are all important steps in initiating AI. Listen in as experts discuss where they are in the procurement and implementation stages as well as where they see their agencies growing into. They will also discuss different issues and potential solutions that they’ve troubleshooted while working with AI.
Addressing the Cyber Security Priorities Set for Fiscal Year 2024
Presented by
Tune into this panel to hear from topic experts on how they plan to move forward with the cybersecurity funding priorities in place. How will agencies’ security policies be affected? What strategies are recommended to ensure the strategy and policy are fulfilled? How will agencies move forward with this new guidance laid out?
How To Be Prepared Against Evolving Software Supply Chain Attacks
Presented by
Combating modern-day software supply chain attacks is significantly more complicated than in the past. Adversaries are getting craftier and are no longer waiting to exploit publicly disclosed vulnerabilities to launch a cyberattack. Join our panel of experts as they discuss best practices to protect against evolving software supply chain attacks and emerging threats to your open source environment.
Responsible AI & Speed to Mission: How Can Government Agencies Achieve Both?
Presented by
Responsible AI ensures that end-to-end model management addresses the specific risks of AI (i.e., discriminatory biases and lack of transparency) in order to prevent compounding issues in the real world. But it is not always clear how to operationalize these broad principles or handle situations where there are conflicts between competing goals. In this session, data and AI experts in the public sector will share their journey to empowering speed to mission in their agencies, while taking Responsible AI from theory to practice.
2023 DFARS/CMMC 2.0 Regulatory Framework Update
Learn about the framework for leadership and stakeholders of the Defense Industrial Base (DIB) to make more informed business and cybersecurity decisions. Gain an understanding as early adopters and the opportunity to get secure, stay compliant, maintain current DoD contracts, and win more business. This presentation will provide participants with an overview of the current Department of Defense (DoD) DFARS 252.204-7012 and upcoming CMMC 2.0 regulatory requirements.
When All Fails: How To Be Cyber Resilient
Presented by and
Tune into this panel to listen to topic experts as they answer the following questions and speak to their cyber resilience plans: How would you recommend one assess a current cyber preparedness and ability to detect, respond and recover from a cyber attack? What are some best practices for data protection and recovery to help agencies avoid malicious activity or recover from a successful attack successfully How to best prepare the workforce to be more cyber resilient?
Upskilling The Federal Workforce to Meet Mission Objectives
Presented by
There doesn’t seem to be a week that goes by without a new publication on the government’s continuous need to upskill IT teams for cybersecurity, cloud computing, data, AI/ML, and more! The need for reskilling is foundational in the President’s Management Agenda, the Cybersecurity EO, Digital Literacy Bill, and the DoD Cyber Workforce Framework. Some agencies are further ahead than others. Learn from experts in the field on how to go beyond talking about reskilling and start acting.
ATARC And FMG’s Mobile Breakfast Summit
Mobile devices have revolutionized the way we do work, enabling on-demand access to services and information anytime from anywhere. Modern mobility brings along an ecosystem of networks, operating systems, mobile applications and their supporting cloud services. Hear experts discuss security features for mobile tools, technologies, products, 5G, and services; and examine how agencies can improve on enterprise-wide mobile security strategy and policy.
The Quantum Security Challenge
Presented by
Quantum computing is advancing rapidly, and its impact is likely to be large—their potential computational power that could render today’s encryption algorithms obsolete. Attend this webinar to learn how to develop a quantum safe transition strategy. Panelists will discuss the quantum threat to today’s cryptography and provide guidance on how to prepare for the future.
Using IOT and AI to Transform Operations, Improve Sustainability, and Increase Readiness
Presented by
IoT and AI can also significantly improve the sustainability of large facilities. Facilities maintenance powered by these next-generation technologies can significantly reduce operational costs, minimize the energy footprint, and optimize working conditions. Learn more about the efficiency and savings from continuous monitoring of assets, and the widespread adoption of wireless sensors to create an Internet of Things.
How to Accelerate DevOps and Cloud With New SRE Practices
Presented by
Cloud computing has introduced new complexities to the public sector, with teams now being responsible for maintaining scalable infrastructure and applications in increasingly complex and distributed environments. The demand for automation has produced a new role, which has arguably become one of the most critical functions in a cloud-first business: the site reliability engineer. Learn why SREs are vital to the collaboration across a Federal IT department and how the roles of DevOps are changing.
ATARC 2022 Zero Trust Summit
What is the importance and role of emerging technologies while Federal agencies are in the process of adopting and implementing Zero Trust Principles? Hear about the challenges and best practices while agencies are in the process of adopting and implementing Zero Trust principles. Learn how and why emerging technologies are evolving at a faster pace than ever before, especially as the Government aims to implement Zero Trust Security.
Ethical Uses of AI with the Federal Government
Presented by
AI has the power to elevate the citizen experience, using predictions and recommendations, while reducing a major burden on governments. Join our panel of experts as they discuss the journeys they’ve taken with implementing AI as well as the ethical dilemmas that have come up. Panelists will speak to the citizen experience, removing bias, and who “owns” AI in a department?
ATARC Identity and Access Management Virtual Summit
Presented by
Digital transformation and the increasing reliance on remote business continue to accelerate the adoption of new identity and access management (IAM) approaches and technologies. IAM and IT leaders face new business demands that require digital trust across every interaction and channel. Tune into this event to see how topic experts face these demands and hear about their best practices in the continued evolution of access management.
The New Workforce and Where We Are Heading
Presented by
Tune into this panel as topic experts dive into what it means to transform a workforce. As the workforce returns to the workplace, what best IT Modernization strategies do these topic experts recommend for continuing to transform the workforce? How does IT Modernization help transform the workforce?
Immediate Future: Are AIs Persons?
ATARC’s AI and Data Policy Working Group intends to investigate the policy implications of AI personhood for the US Federal government. We believe the topic will become critically important as technology advances, public awareness grows, and the limitations of current policies become apparent. Our goal is to help federal policy makers develop and implement policies in this area that conserve American values while enabling the development and application of emerging AI technologies. We hope to accomplish this goal by providing a forum for broad stakeholder discussion of AI personhood in order to develop clarity of what AI personhood means, how it might affect society and the government, and what areas of focus should be in developing relevant policy.
The Importance of Identity Management Virtual Summit
Hear as topic experts discuss the importance of Identity Management within federal agencies and how the hybrid workforce has affected it. What best practices do these topic experts recommend to help best protect data? How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls?
Stronger Together: How to Empower Federal Agencies’ Cybersecurity
Presented by
The last five years have seen an increase in the success of Federal agencies’ cybersecurity due to legislation and funding. However, the threats that we are now facing have advanced in the five years that we’ve been playing catch-up. In addition, more of the Federal government has transitioned to heavily relying on technology and cloud infrastructure as we dealt with the COVID-19 pandemic. Tune into this webinar to hear experts explain the challenges they’re facing with growing cybersecurity threats while attempting to update and secure across all Federal agencies!
ATARC 2022 Cloud Migration Virtual Summit
Tune into this panel to hear from Federal topic experts on the reasons to migrate to the cloud, common migration experiences, and the benefits cloud migration can bring. What lessons have these topic experts learned while making the shift to the cloud? What challenges did they face? What best strategies did they have to put in place to overcome these challenges?
ATARC 2022 Health IT Virtual Summit
Tune in as topic experts explore the Federal Health IT Strategic Plan, what it means for agencies, and the steps needed to implement it. In what ways do these topic experts see the future of the Federal Health IT Strategic Plan being strengthened by using data? What will that look like within the Federal Government? Hear from thought leaders and topic experts on how to create great and sustainable citizen experiences, vaccinate Americans, and enable a safe return to work.
Accelerating Zero Trust Implementations with Network Visibility
Presented by
OMB’s memorandum M-22-09, “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles,” is setting deadlines for implementation across the government. Specifically, the memo calls out the end of FY24, for multiple actions across the CISA-defined five pillars of a Zero Trust Architecture. Tune in as this panel of topic experts explores what it takes to build a proper network baseline to ensure that all valid use cases are accounted for.
Best Practices for DevSecOps and Authority to Operate (ATO)
Presented by
Shifting left and building software with security and compliance integrated from the start is critical to increasing trust in our digital infrastructure. Join us for a virtual event with a panel of U.S. government cybersecurity experts to learn more about recommended best practices to obtain ATO and deploy software faster.
Strengthening Cybersecurity in State and Local Agencies using Zero Trust
Presented by
Most IT leaders acknowledge the growing threat from ransomware, however many state and local governments are unprepared to prevent or respond to it. Join this webinar to hear state and local cybersecurity experts outline how to build effective protection against ransomware by making Zero Trust a strategic priority. They will explore the best practice for implementing a Zero Trust architecture that ensures your backups are truly immutable.
ATARC 2022 AI & Data Analytics Virtual Summit
Listen in as topic experts explore how the use of artificial intelligence to increase fairness and equity has become important throughout governmental decision-making. How should the government validate, measure, and ensure the ethics and fairness of AI systems and decisions? What steps are completed and planned to leverage AI towards improvement in overall government operations?
Planning for Phishing-Resistant Multi-Factor Authentication
Presented by
The May 12, 2021 White House Executive Order 14028 and subsequent Office of Management and Budget Memo M-22-09 set forth a Federal Zero Trust Architecture strategy and a new baseline for access controls. In order to reinforce the government’s defenses against increasingly sophisticated and persistent threat campaigns, agencies are now required to meet specific cybersecurity standards and objectives by the end of fiscal year 2024. Attend this webinar to hear Federal topic experts discuss how they are moving to implement the phishing-resistant protocols.
Building for Secure MultiCloud Environments within State and Local Agencies
Presented by and
Managing a decentralized ecosystem comes with challenges and complexities. The path forward requires a new strategy, the right investments, and trusted partners. Tune in as this panel of topic experts explores what it takes to build a secure modern hybrid ecosystem that serves state and local government needs today and into the future.
What’s Out There? –Overview of Standards and Mandates, Tools and Solutions to Manage Cyber Supply Chain Risks
Federal government agencies rely extensively on IT products and services to carry out their operations. There is, however, cybersecurity supply chain risk in connection with acquiring, deploying and using these products and services. This is evidenced by the numerous supply chain attacks over the past decade such as the Target data breach in 2013, Solarwinds attack in 2020 and Kaseya attack in 2021. As a result, the federal government has taken several actions in an effort to address cybersecurity supply chain risk and these actions have resulted in executive orders, laws, regulations, guidance documents, etc. This roundtable discussion will provide information on the federal government actions in the last several years, resources that can help with establishing a SCRM program, available tools to conduct SCRM across the federal government, the challenges associated with conducting SCRM and the help available for agencies in meeting the mandates to implement SCRM.
The Rise of Phishing-Resistant MFA: How We Got Here and How to Move Forward
Presented by
The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities—and for good reason. During this webinar, experts on Federal identity will discuss the history of identity verification and authentication in the Federal Government, and the key security use cases authentication technology needs to support today.
Make Every Second Count When Recovering from Cyber Outages
Presented by and
During this panel, topic experts will explore how agencies can make every second count when recovering from an outage. What best practices and tools do they recommend? Are there any challenges that should be anticipated and if so, what solutions are effective for overcoming them? Our panelists will answer these questions and more as they dive deep into the importance, benefits, and steps to managing, implementing, and executing effective data protection strategies.
Quantum Speaker Series – Barbara Goldstein (NIST)
Ms. Barbara Goldstein serves as Associate Director of the Physical Measurement Laboratory, the largest operational unit at NIST consisting of approximately 1300 staff and associates and two joint institutes, and which is responsible for realizing and disseminating rigorous measurements to support commercial, defense and research enterprises. Ms. Goldstein manages the “NIST on a Chip” program which is establishing a new paradigm for precision measurement dissemination through a suite of deployable, fit-for-purpose, quantum-based standards to be embedded in products or installed at user sites.
Impact of AI and Machine Learning on Financial Crime Investigation
Presented by
Government agencies are struggling to cope not only due to an acute shortage of skilled manpower, but also because there are no predefined rules on how to detect bad actors in these new and emerging situations. Watch our webinar to learn more about current challenges facing financial regulators and law enforcement agencies, and using AI and machine learning to recognize and track criminal behaviors.
One Year In: The Executive Order and Securing Software Supply Chains
Presented by
In response to the Executive Order on Improving the Nation’s Cybersecurity published in May 2021, new mandates call for accelerating the adoption of secure open source software (OSS) and commercial off-the-shelf solutions to speed software delivery from years to minutes. Join us for a panel discussion with experts from across the Federal defense agencies as they cover key insights from the Executive Order on Cybersecurity.
Colonial Pipeline in Retrospect: Securing the Nation’s Critical Infrastructure
Presented by
The Biden Executive Order, extended 100-day action plan, and other directives call for private-public collaboration to protect the nation’s grid, water/wastewater facilities, and pipelines, but how do you take action to implement shared defense between the public and private sectors? In this webinar, General (Ret.) Keith Alexander and Brandon D. Wales, Executive Director, Cybersecurity and Infrastructure Security Agency, will discuss with Joe Marks, from The Washington Post, ways to implement a Collective Defense approach to securing the nation’s critical infrastructure.
GITEC 2022 Emerging Technology Conference
The 2022 GITEC Emerging Technology Conference provided opportunities between leaders within government, academia and private industry to discuss the state of the current IT landscape. During the event there were panels and conversations offering collaborative forums for identification, discussion, and resolution of emerging technological challenges.
Reducing the Attack Surface in Government Agencies
Presented by
Cyberthreats are disrupting our lives now more than ever, and we’ve reached a tipping point. Agencies are turning to Zero Trust for complete network security, but are unsure how to make Zero Trust actionable. Tune in for this virtual event with a panel of cybersecurity experts as we explore how to navigate the journey toward a Zero Trust approach.
Data Analytics Lab Presentation
GSA wants to improve the utilization of small businesses on federal contracts. In support of this goal, they would like to use AI and machine learning to analyze procurement data from the Federal Acquisition Service (FAS). As part of this effort, GSA asked the ATARC Data Analytics and AI Lab (ADAAL) to build a Spend Analysis prototype focused on analyzing contracts awarded by various agencies over the past few years. The prototype was built using SymphonyAI’s patented award-winning EurekaAI platform, leveraging the secure lab environment provided by nAbleLabs. The presentation describes the background and scope of the GSA Spend Analysis Prototype, the EurekaAI platform used to implement it, results of the prototype, and potential next steps. The prototype was used to analyze FAS data for 376,000 IT contracts awards awarded over a 4-year period (2017 – 2021). for the analysis was on contracts awarded by GSA, DOJ, HHS, and DOD.
2022 Emerging Technology Virtual Summit
Listen as leaders in the field discuss how different emerging technology will impact the way federal employees continue their work in government. Emerging Technologies are evolving at a faster pace than ever before, especially as the workforce pivots to a telework environment. In this event hear about how drones and expanding the IOT can help Federal agencies get assimilated to the use of emerging technologies.
Combating Cyber Attacks Within State and Local Governments
Presented by
As ransomware and other cyber attacks continue to rise, agencies must prioritize strengthening their cybersecurity. Creating and implementing an in-depth strategy to help build a reliable and resilient security infrastructure is critical to preventing a host of unwanted outcomes. During this event, state and local cybersecurity experts from agencies across the country will explore the steps that their security teams are taking to harden their environment from attacks.
Federal Mobility Group and ATARC 5G Government Symposium
The Federal Mobility Group (FMG), in partnership with ATARC, is holding its annual 5G Government Symposium to drive greater awareness of fifth generation (5G) technologies, highlight innovative use cases and showcase current deployments.
Access Management and DevOps: How to Cater them to Hybrid Work
Presented by
DevOps support has become essential to many organizations looking to become more responsive and innovative in our evolving digital world. Application developers and other agile teams increasingly need privileged access to essential tools to work in dynamic environments. Join government security experts to discuss how advanced secrets management enables agencies to accelerate their digital transformation and DevOps projects.
Government-Wide Category Management Industry Day
Category Management is the practice of buying common goods and services as an organized enterprise in order to improve the efficiency and effectiveness of acquisition activities. Tune in and hear discussions of the current issues and solutions of category management in regard to small businesses and requirements gathering! This insightful Industry Day will feature 3 sessions of panels including “Using Data to Design Small Business Strategies”, “IT Category Panel: Strategies for Small Business Success in IT”, and “Best Practices for Requirements Gathering”.
ATARC Law Enforcement Summit: Securing Your Environment with Automation
Presented by
Tune into this session to hear from Federal Leaders on the unique challenges of managing these identities across hybrid cloud environments. What are the fundamental capabilities needed for management of millions of identities within this hybrid cloud environment? Listen as subject matter experts address different Federal hybrid cloud use cases, as well as lessons learned throughout this process.
2022 Hybrid Cloud Virtual Summit
Tune into this session to hear from Federal Leaders on the unique challenges of managing these identities across hybrid cloud environments. What are the fundamental capabilities needed for management of millions of identities within this hybrid cloud environment? Listen as subject matter experts address different Federal hybrid cloud use cases, as well as lessons learned throughout this process.
Mapping a Zero Trust Journey for the Federal Government
Presented by
Cyberthreats are disrupting our lives now more than ever, and we’ve reached a tipping point. Agencies are turning to Zero Trust for complete network security, but are unsure how to make Zero Trust actionable. Tune in for this virtual event with a panel of cybersecurity experts as we explore how to navigate the journey toward a Zero Trust approach.
The Executive Order: The President’s Management Agenda and Customer Experience
Presented by
As a part of The President’s Management Agenda, Priority #2 focuses on the customer experience and asks the Federal government to refine their current standards to better fit the needs of the American people. During the event, experts discuss what the first steps in addressing the new customer experience requirements are, and what infrastructure needs to be in place to ensure that the American public is receiving the best care.
DevSecOps: Reducing Risk at Scale Virtual Summit
Presented by
Where do topic experts see the future of DevSecOps going? How does security by design impact compliance? What does the future of security by design look like? In today’s environment Federal agencies have an urgent focus on cybersecurity, digital modernization, and delivering services online to the citizens and communities they serve. Hear subject matter experts dive into what they are doing to ensure consistent DevSecOps practices while becoming secure by design.
Modernizing Authentication Through the Use of Identity Management
Presented by and
Identity Management platforms give organizations the tools to ensure that the right users are accessing the right information on the right devices. These tools can mitigate security concerns by managing access and also enhance user experience by providing seamless access to corporate applications. Join us to hear government leaders discuss the challenges they face with their unique workforces and the processes they put in place to authenticate mobile users.
Disrupting Cyberattacks with Zero Trust and Strong Cyber Hygiene
Presented by
The increasing complexity of government networks has opened new paths for adversaries to launch cyberattacks. Tune into this event to learn how creating a strong cyber hygiene routine aids in ensuring that your systems and devices are protected from threats. Cybersecurity experts will outline where to start, the best tools to use, the best practices to follow, and the many benefits of this basic practice.
ATARC’s Women In Tech Virtual Summit
Presented by
What challenges did topic experts face as they entered the STEM workforce as women? Listen as our panelists talk about the progress that has been made in increasing diversity in STEM fields, and what work still needs to be done. Listen as topic experts dive into the best strategies for harmonizing DevOps and DevSecOps tools, processes, and policies throughout the Federal Government. What lessons have these topic experts learned while harmonizing these tools, processes and policies?
Returning to the Workplace: Using IT Modernization to Transform the Workforce
Presented by
Tune into this panel as topic experts dive into what it means to transform a workforce. As the workforce returns to the workplace, what best IT Modernization strategies do these topic experts recommend for continuing to transform the workforce? How does IT Modernization help transform the workforce?
Strengthening The Future of DevOps Through Emerging Technology
Presented by
Listen as DevOps Experts explain the importance of DevOps across the Federal Government. In this period of time of building the “new normal,” What emerging technology has led to strengthening DevOps? This panel will set out to explain the emerging technology that has been used to help strengthen federal DevOps, along with the future of DevOps in the Federal Government. What does it mean to strengthen your agency’s DevOps? Where do these Federal Leaders see the future of DevOps going, and what emerging technology will help it get there?
Priority 1: Strengthening and Empowering the Federal Workforce
Presented by
Priority 1’s focus on the American workforce challenges government agencies to become model employers in terms of diversifying their workforce and the support they provide those employees. Recruiting and retaining the best and brightest means ensuring the tools and services they use in the workplace are modern and familiar to those they use outside of work. Join this discussion to hear topic experts discuss how the hybrid workforce has impacted their safety and efficiency.
Extended Detection and Response: The Swiss Army Knife of SOC
Presented by
Many federal agencies require FedRAMP authorization before deploying cloud-based solutions, including XDR. Attend this webinar to understand how XDR is revolutionizing SecOps while meeting the stringent security and compliance requirements of government organizations. Hear from a panel of cybersecurity experts as they discuss, key challenges and opportunities for security teams, the evolution of EDR to XDR and how it’s changing SOC operations, and how XDR can help you achieve Zero Trust by verifying the trust decisions made across your organization.
Accelerating Cloud Modernization through Migration within the Federal Government
Presented by
Tune into this panel to hear from Federal topic experts on the reason to migrate to the cloud, common migration experiences, and the benefits cloud migration can bring. What lessons have these topic experts learned while making the shift to the cloud? What challenges have these topic experts faced while modernizing their agency’s cloud? What best strategies did they have to put in place to overcome these challenges?
ATARC’s Mission Critical Identity Security Virtual Summit
Presented by
During the event, topic experts explained how they are using The DevSecOps software development methodology to solve key challenges, and explained why pivoting from their legacy applications to maintain development and availability requirements has become a tough challenge.
Working Together: Securing Modern Application with DevSecOps
Presented by
As agencies begin to pivot from their legacy applications and embrace containerized environments, satisfying security, development and availability requirements is a tough challenge. The DevSecOps software development methodology is a proven solution to this challenge whereby coders, cybersecurity specialists, and system administrators all work together in a more effective way to produce software and maintain compliance. Please join our panel of experts as they discuss key questions: What’s driving these changes in how agencies deliver new applications? What could organizations do to improve as they equip their teams for ongoing technology evolution?
Leveraging Predictive Analytics to Address Climate Change Issues
The impact of climate change is wide-ranging and encompasses environmental, financial, and safety issues. Data, including sensor data, real-time or near real-time data and analytics, and predictive analytics are essential tools for the Federal Government to leverage to predict, forecast, and mitigate the adverse effects of climate change. In this event, climate change and data science experts will discuss best practices, use cases and initiatives, and the best path forward on how data and predictive analytics can be leveraged in supporting an action plan.
ATARC Federal CIO Virtual Summit
During this event, Federal CIO’s dived into the Cybersecurity Executive Order and what it means for their agencies. Also, they discussed best practices that they have for incorporating emerging technologies as the Federal workforce transitions into a hybrid workforce.
Cybersecurity Threats in the Cloud Software Supply Chain
Presented by
Tune in to this panel to hear what topic experts have to say on threat assessment within the cloud and how the Executive Order impacted agencies’ cloud security practices. This panel will discuss key questions such as how can Zero Trust principles help alleviate security concerns within the cloud? How have specific agencies reacted to the new executive requirements for security and cloud management?
ATARC Digital Transformation Virtual Summit
The term “digital transformation” is meant to spur change. To optimize the technology and human resources involved in delivery of Citizen Services, Federal Agencies are embarking upon digital transformation journeys – modernizing IT applications and infrastructure. How are governments planning for and executing upon this transformation and what barriers do they face in completing this journey? Tune in as panelists dive into 2022 Digital Transformation planning, what it will look like and what it means for their agencies’ Digital Transformation Journey.
Fostering Effective DevSecOps with Modern Application Security
Presented by
Join this webinar to learn how modern application security tools help agencies cover more of the software development lifecycle to improve security posture and achieve compliance. Topic experts will discuss DevSecOps processes and how government agencies are improving communication and enabling security adoption to produce more secure web applications.
Dear Security, Compliance, and Auditors, We’re Sorry. Love, DevOps
Presented by
DevOps solved the Developer and Operators conflict, although forgot other essential folks of the delivery lifecycle: Security, Compliance, and Audit. Tune into this panel as topic experts discuss practical ways to get started with continuous authorization for the software delivery lifecycle. What are some best strategies for implementing a continuous authorization for the software delivery lifecycle within your agency?
ATARC Federal IT Modernization Virtual Summit
Digital modernization is the adoption of new technology. It involves upgrading systems, platforms and software to meet today’s modern needs. When agencies set out to improve their digital transformation, they must take advantage of innovative technology to reimagine an organization’s processes, culture, people and customer experiences. It can result in new business models, revenue streams, policies and values.
GITEC Emerging Technology Virtual Awards 2021
ATARC hosted the GITEC Emerging Technology Awards to help honor the teams deserving of recognition for helping modernize IT solutions within major emerging technology themes including promoting current Federal Administration priorities, and accomplishments unique to the challenges of the worldwide COVID-19 pandemic.
Working Together for Privacy Protection: The Importance of Identity Management
Presented by
Tune into this panel to hear from topic experts to discuss the importance of Identity Management within federal agencies as the workforce shifts to a hybrid. What best practices do these topic experts recommend to help best protect data? How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls?
ATARC Digital Services Virtual Summit
In today’s Digital age, as our workforce is transforming into a hybrid environment, many Federal agencies are experiencing problems and challenges. Tune into this event to hear as topics experts address problems and challenges they have faced and how they are using the digital services to implement change to solve their challenges. Listen in as panelists discuss different highlights, successes and lessons learned, during this time.
ATARC Zero Trust Virtual Summit
Tune into this panel to hear from topic experts on the importance of emerging technologies while agencies are in the process of adopting and implementing Zero Trust Principles. In what ways do emerging technologies help this process? What best practices do these topic experts recommend when agencies are using emerging technologies to adopt and implement Zero Trust principles.
Developing and Executing a Data Governance Strategy in State and Local Government
Presented by
Tune in to hear topic experts give their insights on the best practices for developing a data governance strategy in today’s hybrid world. How is this shaping decision making and policies? What pitfalls, if any, will agencies want to avoid as they look to evolve their policies and processes in relation to data security? Our panel of experts will discuss the best ways to execute a successful data governance strategy that allows agencies to collect, manage, store and catalog government data, while also identifying what data should be purged. Learn about the challenges their agencies have encountered while trying to secure and govern their data and how they overcame them.
Furthering Cybersecurity Within the State and Local Government Using Digital Modernization
Presented by
In today’s environment state and local governments and higher education institutions have an urgent focus on cybersecurity, digital modernization, and delivering services online to the citizens and communities they serve. Cybersecurity is consistently ranked as a primary concern for state and local governments. This panel will examine the current challenges, recent successes and lessons learned within the state and local cybersecurity space.
Optimizing IT Operations With AIOps
Presented by
Growing IT complexity means performing even routine operations can excessively tax an agencies IT resources. Using artificial intelligence to automate IT operations (AIOps) makes the impossible possible, enabling IT teams to effectively manage complex environments without piling on new tasks or yet more training – and allowing them to focus on higher value work. Learn how agencies are utilizing AIOps to do more with current capabilities, while speeding response times, reducing redundant work and multiplying productivity.
Improving Federal Cybersecurity with Event Data
Presented by
The President’s Executive Order (EO) on “Improving the Nation’s Cybersecurity (14028)” issued on May 12, 2021 has aggressively outlined an action plan for protecting our nation against the increasing volume and danger of cyber attacks. This session features a panel of government and industry experts who will share their approaches and considerations in tackling the important demands of leveraging event data in cyber defense.
Protecting Against Ransomware in Federal Agencies
Presented by
Advances in security technology have diverted cybercriminals from targeting individuals to a more lucrative approach; holding an organization’s entire operations hostage until a ransom is paid. With government agencies ranked as the 4th most likely sector to be hit by ransomware, it’s imperative that business continuity plans include backup and recovery. Learn how prepared agencies can render ransomware powerless.
Building a Cloud Smart Workforce
A key element of a successful cloud implementation is a properly skilled workforce. Cloud technologies have matured to offer numerous technology solutions to meet any IT need, but knowing how to properly use the “tools in the toolbox” is imperative to move forward. Join us for a panel which will explore how academia is training the future workforce to be “cloud smart” on day one, what cloud and modern IT process skill sets hiring managers are looking for in employees, and what steps the government is taking to reskill their existing workforce.
Future of DevSecOps in Department of Defense Virtual Summit
Presented by
The relevance and importance of DevSecOps has grown in the past few years as agencies solidify their moves toward automating their software delivery lifecycle. Tune into this panel to hear from DoD experts on the importance of DevSecOps and what is in store for it in the future, as well as an exclusive exit interview from Nicolas Chaillan.
How to Improve Mobile Security Ecosystem
Presented by
Join this webinar to hear members of FMMWG share their research and findings recently published in a Mobile Security Ecosystem Paper. Topic experts will discuss security features for mobile tools, technologies, products, and services; and examine how agencies can improve on enterprise-wide mobile security strategy and policy.
Accelerating Government IT Modernization With Cloud
Presented by
When taking on the task of modernizing your cloud, one important factor is to make sure your data is secure. Tune into this summit to hear from topic experts on the best strategies to securely manage data while undergoing the modernization of an agency’s cloud, and dive into why modernizing cloud applications is important for cloud migration. How can the Government use these tactics to innovate and modernize their architectures accordingly?
ATARC Accelerating Government IT Modernization With Cloud Virtual Summit
Application modernization is a key consideration when switching from on-premises systems to the public cloud, whether the impetus is a cloud-first directive or a push from within IT to digitize legacy systems. It can reduce operational overhead, replace obsolete technologies and improve user experience. Tune into this panel as topic experts dive into why modernizing cloud applications is important for cloud migration. Hear as topic experts share the reasoning behind the benefits of modernizing cloud applications, rather than using the “lift and shift ” method.
ATARC Advancing Security Within the Federal Government Virtual Summit
As new technologies are being implemented and deployed throughout the Federal Government, agencies are having to take a step back and ensure their systems are secure. Hear from topic experts on best practices to enable enterprises to adopt new connected devices without fear of compromise by cyber-attack. How can agencies start modernizing to meet the needs of federal authentication? How can Zero Trust Security be implemented to benefit the Government?
Making IT Service Management and Security Solutions More Effective
Presented by and
It’s no secret that getting a clear picture of your hardware, software, and services can be a challenge. Federal IT leaders frequently list vendor audits and unexpected software license true-up as a top concern. Add to the mix – constant adaptation to changing technologies, cyber-attack vulnerability mitigation, and IT asset availability and management in complex hybrid environments – and you start to uncover the challenges involved in Federal IT infrastructure and operations. Hear topic experts share their strategies that agencies can implement to alleviate the concern of the unknown and make operations more efficient.
Why Operational Technology and IT Management is Critical to Security
Presented by
In today’s traditional Operational Technology (OT) management environment, organizations use outdated software that does not scale to the demands of the modern digital environment. Organizations have struggled to efficiently secure, monitor and manage an Operational Technology environment. Join this webinar to learn more about OT security risk management and solutions, benefits of the digital workflow for IT and OT environments and how to drive efficiency and productivity with OT system management.
Advancing Artificial Intelligence and Data Analytics in the Federal Government Virtual Summit
Topic experts from the Artificial Intelligence and Data Analytics fields discuss what strategies and practices they have recently used in their respective Federal Agencies. What does implementing a Federal Data Strategy mean for a Federal Agency? Listen in to get answers to this and much more!
Hear From the Authors: Federal Zero Trust Strategy and Maturity Model
Presented by
Among other Federal Government initiatives, the Executive Order 14028 of May 2021, “Improving the Nation’s Cybersecurity” triggered the creation of three documents, critical to helping agencies to adopt zero trust cybersecurity principles and adjust their network architectures accordingly. Hear from representatives of co-authoring agencies about the importance, creation process, challenges and other insights related to the above mentioned guidance documents.
Modernizing Authentication Across Federal Government
Presented by
With NIST 800-63 Digital Identity Guideline guidance on Fast IDentity Online (FIDO) expected in 2022, Federal agencies need to start thinking about modernizing authentication across internal and external applications and infrastructures today. Hear discussion on the challenges of introducing FIDO into the Government, and best practices for Continuous Diagnostics and Mitigation (CDM) driven tracking and lifecycle management of FIDO tokens such as hardware security keys.
Transforming Agency Security Operations with Artificial Intelligence
Presented by
To keep up with the constant threat of increasingly complex cyberattacks, agencies are turning to security operations that include Artificial Intelligence (AI), integration and automation. Tune into this event to learn how AI can help cybersecurity professionals maintain situational awareness of their operating environments. Topic experts will provide first hand insights into how practitioners are leveraging the latest AI innovations to accelerate security analytics, identify attack vectors, and enable advanced threat protection.
Navigating the Road Ahead for Zero Trust
Presented by
In earlier ATARC Zero Trust sessions, we discussed why Zero Trust is important for securing enterprise resources in a cloud and multi-cloud environment. In this panel discussion, we will dig into practical approaches to executing a Zero Trust modernization plan. Topic experts will cover how priorities and strategies have evolved in the months since the Biden Cybersecurity Executive Order.
Securing Digital Government
Presented by
How can agencies manage and secure an entire network using infrastructure they are already relying on? What strategies and tactics can agencies implement for building a defense-in-depth cybersecurity strategy? Join this webinar to hear from topic experts and thought leaders on how to deploy simple security to improve threat detection, prevention and remediation.
ATARC Advancing DevSecOps Throughout the U.S. Department of Defense Virtual Summit
Presented by and
Tune in as topic experts dive into what it means to adopt DevSecOps from a people-change perspective. How should the new organization be structured? What skills are necessary? Listen as topic experts explore how to scale a trusted approach to DevSecOps.
ATARC 2021 Digital Transformation Virtual Summit
Tune into this panel to hear from topic experts on how emerging technologies have transformed the Federal Government, as well as ways to strengthen an agency’s digital transformation journey. What challenges have these panelists experienced? What solutions were put in place to overcome these challenges?
ATARC 2021 Cloud Virtual Summit
Tune into this event to hear from Federal topic experts on the reason to migrate to the cloud, common migration experiences, and the benefits cloud migration can bring. What lessons have these topic experts learned while making the shift to the cloud? What challenges have these topic experts faced while modernizing their agency’s cloud? What best strategies did they have to put in place to overcome these challenges?
Why Zero Trust Solutions Are Essential for Protecting Multi-Cloud Networks
Presented by
Covid-19 uncovered the Government’s need for a secure cloud environment. The migration to the cloud made organizations stop and think about their security posture and their readiness for this change. As more agencies move to cloud infrastructures, challenges arise with control over individual users’ devices. Is your agency implementing a Zero Trust model? Is there a multi-cloud security strategy in place? Tune in as subject matter experts discuss solutions and strategies when implementing a multi-cloud security network.
Empowering The American Rescue Plan
Presented by
The American Rescue Plan offers Federal, State and Local government agencies the resources they need to restore America’s communities. This bill was designed to facilitate America’s recovery from the economic and health effects of COVID-19. In order to mitigate the economic impact, organizations must be purposeful with their strategies not only for today but for tomorrow and the future onward. How can Federal agencies build and move forward? How can agencies aid in the advancement of policies on healthcare, employment and COVID response? Join this webinar to hear from thought leaders and topic experts on how to create great and sustainable citizen experiences, vaccinate Americans and enable a safe return to work.
Leveraging On Premise Cloud to Protect Critical Applications and Physical Security
An information-sharing event focused on leveraging intelligent infrastructure to support mission critical applications and the unique needs of physical security. With the convergence of physical and IT infrastructure, both security and IT professionals across Federal agencies can no longer rely on traditional three-tier infrastructures. To move forward, they need strategies, technologies, and flexible on-premise cloud-based infrastructure for the broad set of workloads to better anticipate, prevent, and investigate safety threats across their physical buildings and facilities.
Strategies for Leveraging Data in a Multi-Cloud Environment
Presented by
Agencies have come to accept the cloud and migration of data to the cloud as the new normal. The adoption of a hybrid multi cloud data strategy is crucial to manage data access layers and consume cloud resources consistently across agency infrastructures. This panel aims to bring you a collaborative information discussion focused on what may be the best way for agencies to implement public cloud, private cloud, or hybrid multi cloud strategies. Join this webinar as topic experts explore and share strategies that agencies can implement to provide a better experience with the cloud and how they can achieve the full benefits with one in place.
ATARC Federal Cloud Migration Virtual Summit
Presented by and
Tune into this event to hear from federal topic experts on the reason to migrate to the cloud, common migration experiences, and the benefits cloud migration can bring. What lessons have these topic experts learned while making the shift to the cloud? What challenges did they face? What best strategies did they have to put in place to overcome these challenges?
How NOT to Manage a Government Development Project
Presented by
Leading a successful project team is not always easy. One of the many challenges of project management is achieving all the project goals and objectives within the constraints of a specified time. Are development projects getting done on time? Are members of your team excited and motivated about your government project? Join this webinar to learn the tools needed to essentially build an organization from the ground up. Topic experts will cover ways to increase operational efficiencies, reduce security and compliance risks and improve enterprise operations by leveraging a single toolchain.
The Journey to Zero Trust: Start with Privilege Protection & Identity Security
Presented by and
The Culture of Government IT Modernization
Intelligent Data Management: Next Step in Digital Transformation Journey
Presented by and
ATARC 2021 Multi-Cloud Modernization Virtual Summit
ATARC Advancing DevOps Throughout the Federal Government Virtual Summit
Collaboration is important in many aspects of the federal government. When collaboration from different agencies and organizations begin to happen, agencies must take a step back and see the best practices for this to take place. How do we harmonize our DevOps/DevSecOps tools/processes/policies across agencies so integration of the end product is seamless? Listen as topic experts dive into the best strategies for harmonizing DevOps and DevSecOps tools, processes, and policies throughout the Federal Government. What lessons have these topic experts learned while harmonizing these tools, processes and policies?
Protecting Bring Your Own (BYO) Mobile Devices within Zero Trust Frameworks
Presented by
If you are responsible for protecting BYO initiatives within Zero Trust frameworks, please join our webinar to hear:
- Authors of the NIST practice guide discuss best practices for securing BYO mobile devices
- Architects at MITRE on how to enhance protection using the MITRE ATT&CK Framework for Mobile
- Government and industry experts on real-world use cases like the U.S. Department of Defense (DoD) protecting unclassified mobile devices
2021 Cybersecurity Innovations Summit
Presented by
As Federal agencies moved quickly in this past year to put innovative technology solutions into place, the need to strengthen their cybersecurity capabilities and solve increasing cybersecurity challenges have grown even more important. Aligning agency cyber strategies and securely enabling technology infrastructure are even more crucial when coupled with the accelerated transition to remote and hybrid work environments. Agencies have been forced to reevaluate their technology needs and how they can best achieve IT modernization while managing cyber risk in this evolving space. Agency IT boundaries today are blurring with competing demands, from cloud adoption to the expansion of requirements at the edge of the network, and there is an ever-increasing need for the broadest set of visibility, control, and security orchestration tools. Join this panel discussion as leading executives explore securing Federal networks today and in the future, planning for the evolving cyber threat landscape and building a strategy to implement best practices when securing a proliferation of devices and data across networks and in remote locations.
ATARC 2021 Hyperautomation Virtual Summit
New ways of working and sharing information have emerged within the Federal Government. This has pushed agencies to reevaluate their technology needs and develop plans to further their IT modernization strategy. One way in which the Federal Government has gone about furthering their IT Modernization, would be trusting automation. RPA has become an integral part in changing how the Federal Government works, and has started to show the great value it brings to the Federal space.
Edge Computing – A Must for 5G and IOT Success
Presented by
With the rise of remote work it is of the most importance to secure data where it is stored and while it is in flight. Agencies need secure technology infrastructure that can be accessed anywhere, at any time. New data architectures are allowing government employees to securely access data wherever they may be. This past year has shown the need for zero trust data access that enables users to access the data they need to get their jobs done no matter where they are working.
ATARC Emerging Technologies Virtual Summit
Emerging Technologies are evolving at a faster pace than ever before, especially as the workforce pivots to a telework environment. Throughout this panel we will discuss the new and evolving technologies that are driving real change and innovation in the public sector. Topic experts will discuss the future of the Federal workforce, and the emerging technology that will help it get there. How has the shift to telework given the opportunity to reskill the Federal workforce? What emerging technologies have helped with this reskilling process?
ATARC Advancing AI in Federal IT Virtual Summit
This event will explore the current state of technology, use cases, and limitations of Artificial Intelligence, in the Federal Government space. Listen in as Federal Chief Data Officers explain how in this period of time of building the “new normal”, you establish a more consistent and integrated data infrastructure and data practices throughout your agency. What does it mean to strengthen your agency’s data intelligence? Tune in to hear from these CDO’s the challenges, as well as the lessons they have learned while implementing artificial intelligence in their Federal Agency.
Why Agency IT Modernization is Essential for Dynamic Cybersecurity
Presented by
Join this webinar to hear from topic experts and learn how agencies are taking new approaches, changing organizational cultures, and building confidence in modernized and secure IT architectures. Take away practical information to leverage the latest technologies for automating processes, improving enterprise security, and satisfying the mobile Federal workforce.
Cyberattacks the Path Forward
Presented by
Join this webinar to hear from government and industry thought leaders about the recent cyberattacks, the lessons that were learned, and the path moving forward. The cyber threats faced by the private and public sector call for increased collaboration and cooperation across the IT industry, and with those responsible for defending countries from cyberattacks. Recent cyberattacks highlight the need for enhanced collaboration within the industry to collectively improve how we prevent, manage, and remediate these kinds of threats and operations in the future, and underscores the need for deeper public and private partnerships to create a more secure environment for everyone.
View the ATARC Channel
Zoom enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly.