Back to Search Begin New Search Save Search Auto-Notify
Proactively Respond to the Cloud's Chan...
Tune into this webinar session presented by Deloitte's Aaron Brown and Curt Aubley to learn more about these three best practices to help manage common, evolving threats that emerge from cloud use. Taking a holistic approach to address observability prior to deployment- Utilizing DevSecOps to avoid the introduction of vulnerabilities during development by detecting, containing, and remediating pre-deployment. All of these actions are necessary...
December 7, 2022
Organizer: Deloitte
Location: Webcast
Add Favorite
Put Analytics to Work in Higher Education
How can you put analytics capabilities to work regardless of analytics maturity? Data and analytics leaders must know when and how to combine predictive and prescriptive analytics to gain a competitive advantage in the education industry. Join this complimentary data and analytics webinar, where our Gartner expert will guide you through observed outcomes from higher education to illustrate how to put data to work for your institution. You will...
November 28, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
3 Key Steps to Get Leadership Buy-In fo...
Effective cost-of-quality programs reduce costs and improve margins, providing an advantage in a tougher economic environment. Yet, fewer than 20 percent of business leaders say they do anything with the data these programs generate. This complimentary supply chain webinar looks at why business leaders are the key to a successful cost-of-quality program, and provides three actions supply chain leaders can take to secure the buy-in of their lea...
November 22, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
How CalypsoAI is Bringing Independent T...
The race is on for U.S. Defense and Intelligence communities to accelerate the implementation of trusted, responsible AI, and it will require tools and processes to get these systems deployed with confidence, security, and speed. CalypsoAI works with the U.S. Government to develop innovative solutions, both through our partnerships as well as VESPR Validate - our solution for the independent testing and validation of machine-learning models. J...
October 26, 2022
Organizer: CalypsoAI Government Team at Carahsoft
Location: Webcast
Add Favorite
Top 20 Unrestricted Federal Opportuniti...
The start of the new federal fiscal year is upon us, and that means contractors need to build a strong pipeline early to make the most of the upcoming year. Kick off FY 2023 with industry-leading data and analysis on the top federal opportunities opening up in the next year. Join GovWin's federal market experts Carey Webster and Jennifer Sakole and enter the new fiscal year with detailed intelligence on the top 20 highest-profile federal procu...
October 19, 2022
Organizer: Deltek Government Team at Carahsoft
Location: Webcast
Add Favorite
Cyber Solutions Fest 2022: Threat Hunti...
Every year at major security conferences, you can tell the trends in security because seemingly every product and service is being positioned as “look at how we make things easier/cheaper/better.” A few years ago, that was cyber threat intelligence (CTI). Then, it inexplicably changed to threat hunting. But practitioners know that you can’t really separate threat hunting and threat intelligence any more than you can separate...
October 13, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
5 Steps Federal Agencies Should Take to...
Vulnerability management has become an increasingly complicated security challenge for Federal agencies to tackle with the increase in vulnerabilities and acceleration of cloud adoption. Agencies are driven to follow Federal guidelines such as CISA BOD 22-01 and guidance included in the recent Cyber Safety Review Board report on Log4j. Join Nucleus Security's Co-Founders, CEO Steve Carter and CTO Scott Kuffer, as they go through the five pract...
October 13, 2022
Organizer: Nucleus Security Government Team at Carahsoft
Location: Webcast
Add Favorite
FBI and Black Hat Insights: How to Iden...
Extortion, supply chain attacks, and RaaS are just some of the alarming trends gaining momentum in 2022. According to a recent IDC survey, approximately 37% of global organizations said they were victims of a ransomware attack in 2021. These attacks are plaguing companies of all sizes, and yet, many organizations do not have a comprehensive plan of defense. Pure’s all-flash storage solutions help mitigate ransomware before, during and af...
October 13, 2022
Organizer: Pure Storage
Location: Webcast
Add Favorite
IWC-3 2022
IWC-3: Information Warfare & Cyber Conflice Conference Interconnected Systems: The Future Of Conflict From supply chain attacks to internationally dispersed (dis)information operations global conflict continues to evolve. Military communications and air gapped industrial control systems face new challenges with changes in computing power and advances in AI. Interconnected systems and the associated technologies have changed many aspects of...
October 5-7, 2022
Organizer: IWC-3
Location: Tampa, FL
Add Favorite
OptivCon Minneapolis
Learn Industry InsightsAttendees will have access to 8 hours of top-notch content starting with an Optiv-led morning keynote, educational breakout sessions focusing on Zero Trust, Identity, Risk, and Threat, and an inspiring external keynote to close out the afternoon. Connect with PeersConnect with peers and industry experts to learn how to address some of your biggest cybersecurity concerns, and hear about the latest trends. OptivCon's vendo...
September 21, 2022
Organizer: Optiv
Location: Minneapolis, MN
Add Favorite
Back to Search Begin New Search