Back to Search Begin New Search Save Search Auto-Notify
Microsoft Office Offensive Tradecraft
During this webinar attendees will learn about: Recent developments such as Mark-of-the-Web Microsoft security controls including trust settings and decision flows Tactics for gaining initial access, lateral movement, and long-term persistence
May 21, 2024
Organizer: Fortra Government Team at Carahsoft
Location: Webcast
Add Favorite
Enforce Least Privilege Across Every Endpoint
Almost every cyberattack today involves the exploitation of privileges. Broad privileges and entitlements greatly expand the attack surface and leave your organization extremely vulnerable to security breaches. However, a least-privilege access approach requires that users and programs receive the least amount of permission when required to complete specific tasks. Least privilege is one of the most essential security measures for organizatio...
May 21, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Stories From the Field: Measure and Rea...
Business and technology leaders are urgently looking for ways to take full advantage of the potential of artificial intelligence (AI) to deliver value and transform their organizations. This quest will continue nonstop for the foreseeable future, and knowing how to measure impact and how it drives value in your organization is critical to stay ahead. How do you evaluate AI’s value? How have other organizations achieved success with AI in...
May 21, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
May 21, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
The Gartner 2024 Technology Adoption Ro...
Software engineering leaders are adopting a wide range of technologies to meet rapidly evolving needs for speed, agility and to manage increasingly complex software architectures and platforms. There is a huge growing landscape of tools and technologies to help development teams, drive productivity and ensure secure high-quality software solutions. However, it can be difficult to cut through the vendor hype to evaluate the potential benefits a...
May 21, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Mexico Manufacturing & Trade Operations...
Mexico Manufacturing & Trade Operations: A Discussion of the Opportunities and Challenges Arising Under the USMCA Mexico has long been an important node in global manufacturing and supply chain networks. While the rise of China diverted some of the trade and investment that would otherwise have gone to Mexico in the 2001-2017 time period, the passage of the USMCA, considered in conjunction with the ongoing U.S.-China trade war, has had the...
May 21, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
Modernizing Security: Simplifying Zero...
Government security teams today are under constant siege. Not only are they responsible for defending their organizations, but they are also tasked with complying with new and in-depth mandates that span Zero Trust, logging and most recently, artificial intelligence (AI). Leading agencies such as Oak Ridge National Laboratory are at the forefront of security innovation modernization. They achieve this by embracing next-generation solutions tha...
May 21, 2024
Organizer: Elastic Government Team at Carahsoft
Location: Webcast
Add Favorite
DoD: Embracing Continuous Monitoring
Federal cyber leaders are tasked with the challenge of balancing active defense efforts, particularly when the U.S. is involved in international conflict, with building an infrastructure secure from the individual device all the way to enterprise environment. To do all of that, defending their networks and building for the future, DoD leaders must prioritize continuous monitoring of their cyber systems to address hidden vulnerabilities to addr...
May 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Federal Executive Forum Secure Cloud Co...
Cloud technology continues to play an integral role in driving innovation at federal agencies. As use cases become increasingly complex, how can agencies ensure data is secured?
May 21, 2024
Organizer: Federal News Network
Location: Webcast
Add Favorite
Modernize Identity and Access Managemen...
Higher education delivers mission critical value to students, faculty, and other personas. However, in many cases, there is a struggle to increase stakeholder productivity, deliver engaging experiences, streamline identity management, and deliver consistent, robust, and secure access across applications and resources. In this webinar we will cover how higher education organizations should consider transforming IAM through outcome driven, prove...
May 21, 2024
Organizer: IBM
Location: Webcast
Add Favorite
Back to Search Begin New Search