Back to Search Begin New Search Save Search Auto-Notify
Tackling the Elusive Non-Employee Problem
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, error-prone and leads to security vulnerabilities and compliance risks. Without a comprehensive identity security solutio...
June 18, 2024
Organizer: SailPoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Steering Through Complexity: Grasping C...
Join Nick Mistry, Lineaje's Chief Information Security Officer (CISO) and Scott Armstrong, Interos Industry Principal, for an illuminating webinar on the critical subjects of C-SCRIM (Cyber Supply Chain Risk Management) and SBOM (Software Bill of Materials) vulnerability information. Delve into the intricacies of specific policies and key regulations impacting cybersecurity, including Executive Order 2.A and the OMB Memo-CISA Attestation Form....
June 18, 2024
Organizer: Interos Government Team at Carahsoft
Location: Webcast
Add Favorite
Procurement Integrity - Analytics to Re...
SAS' solutions introduce an approach to layer an analytic system on top of your existing systems, creating a continuous monitoring solution. In their upcoming webinar, subject matter experts will highlight real world examples, showing how other government entities improved their procurement and accounts payable processes by integrating with SAP, Oracle and other ERP systems. Join SAS' webinar, where you can also expect to learn more about: Ris...
June 20, 2024
Organizer: SAS Government Team at Carahsoft
Location: Webcast
Add Favorite
No Room for Doubt: Mastering the Cyber...
Unexpected downtime from a cyberattack can be costly for your customers. From lost productivity, reputation or data, having critical systems go down can cause serious damage, especially if there is not a recovery plan in place. Your customers need security and confidence in the recovery, leaving no room for doubt that their systems have clear plans in place to mitigate risk and impacts of cyberattacks.Join Veritas and Carahsoft for an extensiv...
June 20, 2024
Organizer: Veritas Government Team at Carahsoft
Location: Webcast
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Big Data, Big Challenges: How Governmen...
Data is the biggest asset of modern organizations. But thanks to an increase in data breaches, evolving privacy regulations, and litigation volumes, data can also be an organization’s biggest liability. Good data governance is critical to government agencies’ ability to effectively respond to requests for data and reduce their overall risk. Join us online Tuesday, June 25 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government...
June 25, 2024
Organizer: GovLoop
Location: Virtual
Add Favorite
Securing Supply Chains: How Data and Te...
In an increasingly connected world, disruptions to supply chains can severely impact the Department of Defense’s ability to sustain readiness and execute missions. Consequently, it's critical to analyze, predict, and mitigate potential supply chain risks through innovation in technology and data. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense indus...
June 25, 2024
Organizer: GovExec
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
July 7-12, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Back to Search Begin New Search