Sea-Air-Space 2024 Webinar Series: Fort...
Ivanti and Carahsoft are excited to invite you to our Sea-Air-Space 2024 webinar to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Insufficient prioritization that misrepresents vulnerability risk, time-consuming, error-prone manual processes, friction between IT and security teams that can delay or outright block, and remediation efforts. These are all the hallma...
UEM Innovation Update: How BlackBerry H...
Join BlackBerry and Carahsoft for a live webinar providing a fresh look at protecting federal networks and data with UEM updates and key differentiators. In this webinar, attendees will learn about BlackBerry’s upgrades to the UEM platform, including: Enhanced Security for Multiple Deployment Models (COPE, BYOD, etc.) Increased Productivity / UX for Daily Tasks with Microsoft Intune Integration Real-Time Mobile Threat Defense for All Sec...
Seizing the Right Evidence, Anywhere
State and Local law enforcement officers often encounter unique challenges when collecting digital evidence. This webinar focuses on navigating unconventional crime scenes, from **inside a suspect's home** to remote locations like woods or parking lots. Register now to join ADF as they delve into critical considerations for State and Local agencies. Specifically, you will learn how to: Effectively secure digital evidence in diverse environment...
SecureWorld Healthcare
Don't miss the SecureWorld Healthcare virtual conference on May 1, 2024, to connect and learn with other cybersecurity professionals in your field! The agenda offers 12 educational sessions and 5 CPE credits.
AI for Government Summit: Taking the Le...
No matter how quickly technology has changed over the past few decades, nothing matches the speed with which AI has begun to transform how agencies operate. In response to the changing landscape, in October 2023, the Biden administration released two frameworks, the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence and the Office of Science and Technology Policy’s Blueprint for an AI Bill...
May 2, 2024
Organizer:
FedInsider Location:
Reston, VA
AO Perspectives: Managing Risks and Str...
Picture this: you're on the brink of securing that crucial ATO approval, but the path is fraught with pitfalls—complex regulations, potential human errors, and the constant specter of cyber threats lurking in the shadows. As an Authorized Official (AO), you're all too familiar with the uphill battle of navigating the complexities and risks of the ATO package approval process while maintaining the resilience of your organization's defense...
Splunk Workshop Series
Join us for our workshop series designed to enhance Splunk skill sets across your organization! Our five-part virtual workshop series covers fundamental basics, machine learning, observability, dashboard studio, and investigating fraud. Led by industry experts, these hands-on workshops will empower your teams to unlock the full potential of Splunk! Date & Time Workshop Thursday, April 18th 2:00pm ET; 11:00am PT 2 hours Splunk 101 Topics co...
Quantum Readiness: Effective Strategies...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum Computing Cybersecurity Preparedness Act (H.R. 7535) requires federal agencies to prepare now to protect National Security Systems. Specifically, government agencies must maintain an inventory of all information technology in use that...
Connecting the Unexpected: Scalable Dat...
Driven by enterprise mission needs, organizations are attempting to address their end-state requirements with data relevant to the questions they need to answer. The scale and complexity of this data continue to create challenges for agencies, such as: which data is relevant to my problem set? What are we trying to answer with the data? And most importantly, how does this apply to my organization’s overall mission? Knowledge Graphs, wit...
Splunk Enterprise Security Virtual Workshop
Join us for a virtual workshop where users will have the opportunity to walk through multiple real-world scenarios and see first-hand how Enterprise Security can be used from the creation of a notable event to investigate to the raw event that identifies the adversary's action. The workshop leverages the popular Boss of the SOC (BOTS) dataset and is laid out in an interactive format. Users will leave with a better understanding of how Splunk a...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.