CrowdStrike Coffee Chat Live Coaching:...
The Texas DIR contract is an important procurement vehicle for Texas-based customers seeking to purchase the latest information technology software products and related services. Texas DIR leverages the buying power of the State of Texas and delivers access to hundreds of products and services at volume discount pricing. This contract includes Software as a Service, products and related services. Through this contract, state and local governme...
Stop Checking Boxes: How the Federal Ra...
Join Blackboard on September 21, at 11:00am, EST for an engaging conversation where David Casaceli, Railroad Safety Specialist-Technical Training at the Federal Railroad Administration discusses how the FRA approaches training and utilizes Blackboard Learn to deliver education and training.
The Threat Landscape is HEATing Up for...
For many workers, the browser has essentially become the office since according to a recent study by Forrester Consulting, hybrid and remote workers spend more than 75% of their working day in a web browser. Even before the need to support remote workers, the challenges for government IT and security teams was more daunting than ever with the need to modernize IT systems, comply with federal requirements, deal with technology talent shortages,...
Hold the Phone: How State & Local Gover...
Keeping up with electronic records has never been more complicated. With conversations happening on both agency-issued and personal devices, how do leaders at state and local governments capture mobile communications across text, social media, and collaboration platforms and streamline their response to records requests? Join our webinar, Hold the Phone: How State & Local Governments Manage Mobile Records, to discover the latest processes...
Connect-the-Dots Between Today and a Ze...
First defined over two decades ago, zero trust has substantially picked up steam in recent years. President Biden’s Executive Order on Improving the Nation’s Cybersecurity has taken it a step further by codifying zero trust as the Federal Government’s security architecture of choice. Nearly every agency desires to achieve zero trust, but the gap between their existing environments and the ideals they read about leave most st...
Financial Close and Consolidation with...
CANCELED
Many government entities are required by law to submit a comprehensive annual financial report which serves to provide the public a detailed accounting of all taxpayer funds collected and expended, along with transparent presentations of budget to actual comparison statements. Timeliness, along with the need for reliability, are among two of the most important characteristics when it comes to financial reporting and often require years of care...
DevSecOps Readiness: Analyzing Legacy A...
The transition to Agile development is complex and challenging, especially for legacy programs. Where do you start and what obstacles may exist? Agile and DevSecOps are often touted as silver bullets to accelerating delivery of mission winning capability. These modern development and deployment methodologies offer many benefits, but navigating their implementation requires a data-driven understanding of which applications will benefit the most...
SIs Path to Accelerate ATOs through Aut...
STIG & CIS compliance is tiresome and tedious work adding weeks and months to any ATO or RMF accreditation timeline. This crucial IA obligation is often underestimated and will cause program cost overruns which can hurt fixed price engagements. Automation allows System Integrators to claw back costs and accelerate deliverables – ConfigOS allows to rapidly gain compliance across low and high-side infrastructure, including air-gapped a...
Nation-State Threat Landscape Overview: Iran
Join CrowdStrike for a deep dive into the nation-state threat landscape of Iran. Jason Rivera, Global Director - Strategic Threat Advisory Group at CrowdStrike, will give a brief on the broader geopolitical context for the latest Iranian cyber activities, an overview of the primary threat actors responsible for Iranian offensive cyber operations, and these actors’ TTPs (tactics, techniques, and procedures). He will also share mitigation...
Nation-State Threat Landscape Overview: China
Join CrowdStrike for a Join CrowdStrike for a deep dive into the nation-state threat landscape of China. Joshua Shapiro, CrowdStrike’s public sector threat intel SME, will give a brief on the broader geopolitical context for the latest Chinese cyber activities, an overview of the primary threat actors responsible for Chinese offensive cyber operations, and these actors’ TTPs (tactics, techniques, and procedures). He will also share...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.