FireEye Demo Desk
In today's age, some of our most critical democratic processes are being administered digitally, so having a security posture that can protect through dynamic analysis with high efficacy is a necessity. Government agencies must be able to implement proactive defensive capabilities, while also providing the cutting edge intelligence in their tools for the latest cyber-attacks to ensure the integrity of the democratic process.Cyber criminals and...
Getting Started with Splunk Data Manipulation
Join us on October 30th for the Getting Started with Splunk Data Manipulation workshop, a hands-on introduction to the Splunk GUI. Attendees will learn how to upload a .csv to Splunk, perform simple field extractions, and build basic dashboards and reports! During this workshop, attendees will utilize data to: Build several searches to gain more insight on the data set Explore how to set conditional searches Build custom visualizations and how...
F5 Lab Day: Ransomware Prevention
Join F5 Networks and Carahsoft for a hands-on lab to learn about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ransomware attack. We will also discuss the three primary attack vectors used to deliver ransomware and how F5 solutions can be directly...
F5 Lab Day: Single Sign-on & Access Man...
Credentials are the keys to your networks, your applications, and increasingly the API backend of those applications. Join F5 Networks & Netsync for a hands-on lab where you will learn why preventing unauthorized access is critical to protecting your intellectual property and data. Understanding how apps enable user access -- and how apps can be compromised by attackers -- can help you streamline processes and meet user expectations, while...
FireEye Demo Desk
In today's age where all of our most critical information is stored digitally, having a security posture that can only defend based off known signatures is not enough. Enterprises must be able to implement proactive defensive capabilities, while also engaging in threat hunting for the latest TTPs (Techniques, Tactics, and Procedures), IOCs (Incidents of Compromise), and Zero-Day Attacks. This is where FireEye comes in... FireEye is on the fron...
Imagine Nation ELC 2019
For three days in October, forward-thinking leaders of government and industry will converge in Philadelphia to network, share, learn, collaborate, and together imagine and invent their future. Our goal: harness creative thinking, innovation and technology to form a more perfect union of government and industry, and forge actionable approaches and practices that maximize the value we provide to our nation’s citizens. IMAGINE NATION ELC 2...
October 20-23, 2019
Organizer:
ACT-IAC Location:
Philadelphia, PA
GASB 34: Financial Reporting Requiremen...
Gain new insights with a comprehensive overview of government financial reporting from beginning to end. Recent financial difficulties of state and local government finances, highlighted by some noteworthy bankruptcy filings, have prompted increased attention on governmental financial statements. The financial statements of these governments and governmental entities can be very confusing, even for the experienced accountant. This topic will e...
2019 OptivCon Indianapolis
Please join us for OptivCon Indianapolis (formerly “ES3”), a local, exclusive one-day summit where you’ll learn how to reduce enterprise risk and realize stronger, simpler and less costly cybersecurity programs. This complimentary event gives you the ability to connect with your peers and other industry experts to learn how to address some of your biggest cybersecurity concerns, and hear about the latest trends. It includes...
October 15, 2019
Organizer:
Optiv Location:
Indianapolis, IN
Ransomware Prevention
Join F5 Networks and Carahsoft for a hands-on lab to learn about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ransomware attack. We will also discuss the three primary attack vectors used to deliver ransomware and how F5 solutions can be directly...
CDM Central: Navigating the Cyber Roadmap
Top cyber experts struggle to pinpoint the coordinates for successful risk management. DHS’ CDM program is helping agencies locate which direction cybercriminals and attackers are headed. This includes increased focus on securing beyond the perimeter, safeguarding mobile devices, and protecting sensitive data in the cloud. CDM offers a navigation system for government’s security future, but which route is the fastest, the most dire...
October 10, 2019
Organizer:
MeriTalk Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.