How to Stream a Webinar

If you haven’t already registered, navigate to FedInsider Webinar Registration to sign up for the webinar you want to stream. After you have registered, click on the on the specific webinar you want to stream below. When the webinar screen loads enter the email address your registered with into the field in the upper right corner, and click the button to begin streaming. For audio, please enable the speakers on your computer.

FedInsider is committed to accessibility, and all webinars provide live captioning (CART) services for participants. If you need additional information about streaming webinars or need troubleshooting guidance please review our: Webinar FAQs.

Connecting States to the Future with 5G Private Wireless

Tues., September 27, 2022 | 1 Hour

Two years of pandemic living made clear the depth and breadth of the digital divide – states lacking robust internet and wireless infrastructure discovered the gaps that made it far more difficult to provide essential services in a work-from-home world. Today, states and localities are considering investment in such diverse areas as IoT, emergency preparedness, school security, and strengthening their logistics and supply chain management.

When the Infrastructure Investment and Jobs Act became law in November 2021, among its provisions was a pot of money for states to improve their telecommunications infrastructure. In May, the Broadband, Equity, Access, and Deployment (BEAD) program was established to distribute grants. From coast to coast, Alaska to West Virginia, and territories as far-flung as American Samoa and Puerto Rico, elected officials are eager to provide their residents with vastly improved connectivity.

Join us as thought leaders from government and industry outline the potential for these grants to change citizens’ lives and improve agencies’ ability to deliver services.

Building Zero Trust Cyber Resiliency in 2022 & Beyond

Weds., September 28, 2022 | 1 Hour

In May 2021, President Biden issued Executive Order 14028 on improving government cybersecurity. The order required that all federal agencies develop a plan to implement zero trust architectures for their IT systems, and set aggressive timelines for achieving this goal by 2024.

The National Institute of Standards and Technology defines zero trust as “an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.”

Join us as federal leaders and industry executives discuss how agencies are implementing those zero trust security paradigms across on-prem, cloud, and SaaS workloads, including steps taken and lessons learned, focusing in particular on cyber resilience and protecting critical agency data.

5G Private Wireless | Connecting Higher Education to the Future – Today

Thurs., September 29, 2022 | 1 Hour

Just as the pandemic changed the American workplace, it had a major disruptive effect on colleges and universities across the country, forcing them to adopt new remote learning initiatives and revealing the technological shortcomings that campuses faced.

At the same time, it opened opportunities. During the pandemic, Carnegie Mellon University used a rapidly deployed private wireless solution to power live video streams on high definition cameras to monitor and track CDC guideline compliance on-campus. Fisk University, a historically Black university in Nashville, set up an interactive virtual reality lab for pre-med and biology-related majors that enables students to study human anatomy through virtual cadavers, something the university could not offer before because of cost and maintenance requirements for real human remains.

Join thought leaders from higher education and industry as we outline the potential for 5G private wireless networks to power new innovations for students in areas as diverse as classroom education, research on highly data-intensive projects, and sports arenas across the country.

Headlines in Cybersecurity Day 1: The Fight Against Ransomware

Tuesday, October 4, 2022 | 1 Hour

Ransomware threats are targeting state and local agencies with increasing frequency. According to the Verizon Data Breach Incident Report 2022, 80% of attacks on public sector systems were financially motivated, and 78% of the breaches came from outside the network. At the same time, some state legislatures have banned state agencies from paying ransomware, with other states considering the same approach.

These trends are on a collision course, raising the pressure on state and local CIOs to strengthen their defenses against ransomware and broaden their mitigation strategies in case something gets through. Improving identity protection and response, for example, is important, since 80% of all breaches use compromised credentials.

Join us as state and business leaders share what they are seeing on a regular basis, and how they are taking steps to combat ransomware.