FREE/ON-DEMAND: Assessing ITAR Complian...
Assessing ITAR Compliance Programs REGISTER NOW TO VIEW THIS COMPLIMENTARY WEBINAR ON-DEMAND! This webinar takes a deep dive into the State Department's recently published ITAR Compliance Program Guidelines and their prescription for a healthy, risk-based trade compliance program that keeps pace with the daily business developments of an organization. We discuss three key principles common to all trade compliance programs: No two companies are...
Understanding Incoterms 2010
International Commercial Terms, or Incoterms®, are commercial terms or rules that define the seller's and buyer's responsibilities for the delivery of goods under a sales contract. They are published by the International Chamber of Commerce (ICC). Incoterms® are widely used in commercial transactions but often ignored until they are needed. Usually they are incorrectly used and in some cases taken for granted until a shipment goes wro...
Improve Your Compliance Posture with Id...
Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts. Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are...
Hitting the Ground Running: Reviewing t...
In this webcast, CMMC Architects, Gavin Jurecko & Matt Trevors will provide insight on how to evaluate and assess your organization’s readiness for meeting the practice requirements of CMMC Level 1.
FREE Webinar - COVID-19 Outbreak: Antic...
The worldwide coronavirus outbreak has created new challenges for everyone, including those tasked with compliance with U.S. export controls and sanctions laws. Border closures, prohibitions on large gatherings and social distancing have produced new compliance challenges, as well as novel issues related to due diligence, internal investigations, and enforcement. In this webinar, compliance professionals and in-house counsel will learn how to...
CyberCast: Secure Remote Access for Adm...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
HPE Insights and Solutions for Enabling...
The COVID-19 pandemic has triggered enormous challenges for government IT, which must support a growing demand for a remote workforce to continue operations while responding to public health and welfare concerns. HPE and Aruba have mobilized the full weight of our respective resources and eco-system of partners to provide technology, solutions, expertise and support to help our government customers with these challenges. Join this webinar and...
The Power of Voice to Prevent Fraud
Nuance security and biometrics solutions enable easy and secure authentication by identifying a person based on their human traits; like their voice, fingerprints, face or even how they use their devices. The importance of security cannot be understated. Today's businesses rely on working with known customers in a friction-free environment. To get to that level of customer service, organizations need to be confident that their customer is who...
What Is Cybersecurity Engineering and W...
When systems were predominately hardware-based, components were built to specification. Systems engineers defined and verified component functions and interfaces that together provided total system capability. Today, system capability is largely supplied through software components and network connectivity. This increases the system’s flexibility and adaptability—and its cyber risk! Software components are specified loosely, if at...
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.