Back to Search Begin New Search Save Search Auto-Notify
Waging War on Ransomware
Ransomware is posing an increasingly urgent threat to U.S. safety and national security interests. In recent years, ransomware attacks have become much more common among State, Local, Tribal, and Territorial governments, as well as threatening critical infrastructure entities. The danger is so great that the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security has a web page that gathers recommended be...
July 13, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
DevSecOps Sharpens the Tip of the Spear
In a world where technology provides the winning edge, no one values innovation more than the U.S. military. As a result, enabling best-in-class DevSecOps is an increasing priority across the services. The heart of DevSecOps is built on the teams of programmers, systems operators and cybersecurity professionals who collaborate, share responsibilities, and learn from failures and new ideas. Identifying the right skills for new hires and reskill...
July 8, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Outcomes over Infrastructure: Ensuring...
As government agencies rapidly advance in their digital transformation efforts, the flexibility, speed, and agility of new models of acquiring technology infrastructure are growing incrementally. This enables agency leaders to run their IT operations like a business, by connecting technology to business value, building partnerships between IT and mission teams throughout agencies, and breaking down data silos across organizations. Join us as t...
June 30, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How NOT to Manage a Government Developm...
Leading a successful project team is not always easy. One of the many challenges of project management is achieving all the project goals and objectives within the constraints of a specified time. Are development projects getting done on time? Are members of your team excited and motivated about your government project? Join this webinar to learn the tools needed to essentially build an organization from the ground up. Topic experts will cover...
June 30, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Power Block Session: NSX-T Advanced Loa...
Dive into NSX-T Federation to deploy a resilient virtual desktop infrastructure across multiple sites while controlling ingress traffic using the NSX Advanced Load
June 30, 2021
Organizer: Sterling
Location: Webcast
Add Favorite
Outcomes over Infrastructure: Ensuring...
As government agencies rapidly advance in their digital transformation efforts, the flexibility, speed, and agility of new models of acquiring technology infrastructure are growing incrementally. This enables agency leaders to run their IT operations like a business, by connecting technology to business value, building partnerships between IT and mission teams throughout agencies, and breaking down data silos across organizations. Join us as t...
June 29, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Introduction to Governance and Complian...
Course Details Join this training to get an overview of the services that you can use to help meet compliance and governance controls in the Amazon Web Services (AWS) Cloud. You’ll discover the fundamental cloud security concepts, including access control, data encryption methods, incident response, and security for network access to AWS resources. Topics Covered: Identify and describe the security benefits and responsibilities of using...
June 25, 2021
Organizer: Amazon Web Services (AWS)
Location: Webcast
Add Favorite
Publish Beta Customer Training
Join GPO for a one-hour webinar and learn all about the exciting capabilities of GPO's new online printing and publishing ordering portal - Publish. Agenda: How to register Live demonstration of the ordering process Useful tips and help features Demonstration of the benefits of the Publish dashboard
June 24, 2021
Organizer: U.S. Government Publishing Office (GPO)
Location: Webcast
Add Favorite
The Journey to Zero Trust: Start with P...
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best pra...
June 24, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
CyberRx: Securing Healthcare Data
The core goal of any public sector healthcare facility is to provide the best possible care for their patients. But those facilities are also charged with the safekeeping of their patient’s medical data and personal information. Exactly how that data should be protected is tightly defined through regulations like the electronic protected health information rules as well as laws like the Health Insurance Portability and Accountability Act...
June 24, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search