348 past events found
Back to Search Begin New Search Save Search Auto-Notify
2022 - FAR Supplement - DIAR - Interior
FAR Agency & Department Supplement - Webinar Series Complimentary & Recorded Find recordings on our website and YouTube Channel Sponsorships available at hello@jenniferschaus.com
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Hacks, Threats & Ransoms - What's Next?...
Reduce the risk of security breaches by understanding and protecting what matters most: your critical data. Establishing metadata-driven intelligence and automation to operationalize data protection management helps you discover, classify, analyze, protect, and monitor sensitive data across your organization. Whether your sensitive data is structured, semi-structured or unstructured data in the cloud, on premises, in big data stores, or in rel...
Add Favorite
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Add Favorite
AvePoint Webinar: Modernizing Governmen...
Government agencies have significantly accelerated their digital transformations in the wake of the pandemic. With AvePoint's portfolio of SaaS solutions recently receiving FedRAMP Authorization, they can continue to accelerate this transformation while ensuring their collaboration is compliant and secure. This includes an automated workspace management system to increase security and data protection across all Microsoft 365 workspaces that wi...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
FAR Part 42- Contract Administration An...
This part prescribes policies and procedures for assigning and performing contract administration and contract audit services.
Add Favorite
Investigations on the Darknet: Case Stu...
Andrew Lewman, the Executive Vice President of DarkOwl, will explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for an intelligence community-based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approa...
Add Favorite
Geospatial Tools for Contact Tracing an...
In the wake of the recent pandemic, geospatial tools and workflows can enable contact tracers with the ability to efficiently collect contact information, warn contacts of exposure, and track chains of transmission. Location data powered by Mapbox, alongside Twilio's communication platform, allows contact tracers to interview patients, notify contacts, and send symptom survey reminders to provide optimal support services. This complimentary we...
Add Favorite
Back to Search Begin New Search