Choosing the Right Mobile App Security...
In today's rapidly evolving digital landscape, securing mobile applications is more critical than ever for enterprises. As cyber threats become increasingly sophisticated, organizations must carefully consider their approach to mobile app security. Should they adopt a comprehensive platform solution or opt for best-of-breed tools tailored to specific needs?Join us for an insightful webinar with GigaOm’s Howard Holton. We will explore th...
GE3 | Government Experience, Engagement...
Discover the latest innovations from government leaders and industry experts. The GE3 seminar for government professionals focused on Experience, Engagement, and Enrollment, the three Es of engaging stakeholders and audiences, building subscribers, driving adoption, and enrolling customers in benefits programs. The summit takes a deep dive into the elements of creating and successfully engaging a community — technologically, analytically...
Trade Compliance Toolbox: A Jurisdictio...
RECORDING AVAILABLE ON DEMAND:Trade Compliance Toolbox: A Jurisdiction and Classification Deep Dive(Recorded June 11, 2024) In today's globalized business landscape, adherence to export compliance is paramount, and accurate classification is the foundation of ensuring regulatory compliance. Join former regulators Candace Goforth, Tony Dearth, and Bruce O’Cain as they analyze the classification process and provide benchmarking information...
Ask Us Anything: VMware by Broadcom Army ELA
Attendees joined us for our Ask Us Anything: VMware Army ELA webcast where they heard from Department of Defense IT expert and VMware Army Program Director John Jordan on how you can best leverage VMware technology in this contract.During this webcast, attendees learned about:The full scope of VMware technologies available to you in this new ELAA variety of army-specific IT trainings you and your team can attend to upgrade your mission-critica...
Turning Technological Advantage Into Ba...
The spotlight is on artificial intelligence (AI) and its role in shaping the future of defense strategy and operations. In this session, you’ll hear from Igor Jablokov, CEO and founder of Pryon and the AI visionary whose previous venture became the foundation for Amazon’s Alexa. Igor and his team at Pryon have been at the forefront of AI innovation, advocating for responsible AI development and pioneering secure AI deployments to s...
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
How to Create a Framework for Winning P...
Also read: The Best Capability Statement for Government Contracting in 2025 How to Create a Framework for Winning Proposals | Shift Left To win, your proposal must be more than just 'compliant'. You need to stand out from your competitors. In this training, Neil McDonnell explains what goes into a 'winning proposal' and the framework that makes proposals both compliant AND compelling. 01:00 ➣ • Intro to the Ingredients of Winning...
SECURE Washington, DC
Strengthen the security of your organization’s critical assets with actionable strategiesfrom ISC2 SECURE Washington, DC, streaming live online December 4-5. Over two days, you'llcollaboratevirtually withcyberexperts in sessions focused onthe global challenges facing government and private sectors.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.