Back to Search Begin New Search Save Search Auto-Notify
Decision Science for DoD Resourcing ...
The Department of Defense's ability to fully implement the National Defense Strategy depends on success in the domain of resourcing and reform. This includes executing reform priorities quickly while managing costs efficiently; a challenge that has plagued defense leaders who previously relied on outdated, manually compiled, or incomplete data.Join this complimentary webinar for an exclusive analysis detailing how decision science conveys a cl...
Add Favorite
Defending Aganist Ransomware Attacks
Join our Tenable webinar on defending ransomware through effective vulnerability risk management. Implementing an effective ransomware defense strategy is not an impossible task. By ensuring proper implementation of basic cyber hygiene practices across the organization and focusing limited resources first on what matters most in terms of vulnerability remediation, public sector organizations can transform themselves from "soft" to "hard" rans...
Add Favorite
UiPath Higher Ed RPA Summit
UiPath considers education a core value and demonstrates it through our Academic Alliance. We invite you to join us at our virtual Higher Ed RPA Summit, where we will discuss our powerful RPA enterprise platform. Whether you are a student interested in learning about RPA as a career, or an administrator trying to control cost and create efficiencies, this webinar will address your interests. From government to business and now to educational i...
Add Favorite
UiPath Higher Ed RPA Summit
UiPath considers education a core value and demonstrates it through our Academic Alliance. We invite you to join us at our virtual Higher Ed RPA Summit, where we will discuss our powerful RPA enterprise platform. Whether you are a student interested in learning about RPA as a career, or an administrator trying to control cost and create efficiencies, this webinar will address your interests. From government to business and now to educational i...
Add Favorite
How to Deliver NIAP Compliant Mobile Ap...
The National Institute of Standards and Technology has partnered with the Department of Defense and several federal agencies to create a standardized mobile app vetting process for the National Information Assurance Partnership (NIAP) compliance. In 2019, NowSecure partnered with the U.S. Air Force to kick off the creation of an automated software security testing solution to enable NIAP compliance for mobile apps. This is an easy-to-use solut...
Add Favorite
Reducing Teleworking Risks with a Softw...
Secure access is not a new challenge for IT operations, but with the accelerated shift to working from home, the need to rapidly scale secure remote access has skyrocketed. The most promising security approaches in place today, like the Cloud Security Alliance's Software Defined Perimeter (SDP) approach, had their start from government approaches. In SDP environments, government data is being accessed more by unmanaged, risky, and potentially...
Add Favorite
Emulating Threat Methodologies
Rapid7 and Carahsoft invite you to join us for a 30 minute webinar that will feature Ben Elser, Senior Security Solutions Engineer at Rapid7, digging into some of the ways attackers are leveraging their older exploits - specifically EternalBlue - on the latest surge of ransomware attacks against the U.S. Public Sector and what you can do to prevent them. Some of the topics we will cover during this brief presentation include: Introduction to T...
Add Favorite
Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Add Favorite
Understand and Leverage Breached Data w...
Cyber-enabled crimes and frauds are extensive, can be highly advanced, and are becoming more and more common, leading to a loss in data, reputation, and funds. Organizations and businesses protecting from cyber-attacks require the collection and analysis of all types of data, including data that has appeared in breaches perpetrated by these cyber-attacks. Join us for this webinar to discover: Data breach trends and how this data can be used Ho...
Add Favorite
Part 2 Trend Micro & Four Points Webinar
Register for this webinar to learn how your agency can use a tool that can identify risk, mitigate, report, and alert on compliance gaps in your cloud infrastructure. Regardless if you have one primary Cloud Service Provider or benefit from many!Attendees of this webinar will learn to:Address NIST 800-53 and 800-171 controls Mitigate misconfiguration of your cloud infrastructureQuickly stand up workloads while meeting ATO regulatory objectives...
Add Favorite
Back to Search Begin New Search