Unlock the Potential of Commercial Inno...
While the U.S. federal government is developing and adopting new technologies at an unprecedented pace, it’s still challenging to capitalize on emerging technologies from the commercial sector without loosening critical security and compliance controls. How can the intelligence community embrace commercial innovation while protecting classified data? And how can our national security agencies work effectively with commercial technology i...
Transforming For The Age of Digital Inv...
Every day around the world, digital data is impacting investigations. Making it intelligent and actionable is what Cellebrite's Intelligence Investigative Platform does best. With an ever-growing variety of digital devices and cloud sources producing volumes of highly valuable data, investigators need intuitive solutions and training to leverage this critical source of evidence when resources are limited. Join us on Thursday, July 29th for a l...
Build a Scalable and Secure CI/CD Pipel...
Join our experts to learn how teams inside Department of Homeland Security (and DHS components) can deploy Splunk, GitLab, and D2iQ together to support CI and CD process automation, securely accelerate application development and deployment, and lay the groundwork for continued modernization and innovation.During this webinar, attendees will learn:How to secure each stage of the development lifecycle through GitLab (SAST, DAST, Container Scann...
11th Annual Adobe Digital Government Sy...
Digital Experiences that Put People First The people you serve, from citizens to employees, expect the same digital experiences from government that they have everywhere else. They want online interactions that are personal, seamless, and easy to access from any device. From delivering a modernized web platform, to digitizing forms and services, to creating and delivering relevant content, agencies can combine mission success with great experi...
How COVID-19 Impacts Cryptocurrency Cri...
Any crisis will have bad actors looking to profit off of it. We're already seeing reports of cybercriminals using COVID-19 to scam the vulnerable, extort healthcare providers, and spread misinformation.Register today to learn about the role cryptocurrency plays in COVID-19 related crimes such as: Scams taking advantage of the crisisRansomware attacks against healthcare providersHow darknet markets react to a pandemicJoin us online with Kim Gra...
Software Supply Chain: Code-to-Code Combat
Is your agency doing everything it can to protect against foreign interests from hacking the software that it relies on? From third party software libraries to in-house developed applications to PowerShell scripts, code signing is a necessary component to securing your software infrastructure. Code signing is effective at ensuring that the code you execute comes from where it claims to come from and hasn’t been modified by a third party....
CyberSmart: Strengthening Security Post...
As the management of government information and services moves online, securing the nation’s critical infrastructure from cyber attacks is essential to national security and the integrity of our democracy. In Denver, we will explore how city, state, federal and defense communities are safeguarding some of the nation’s most valuable assets—both physical and digital.
CyberSmart: Strengthening Security Post...
The nation’s second-largest city, Los Angeles and the surrounding region serve millions of citizens, all of whom are affected by the security of its data, infrastructure, services and transportation. At this event we’ll look at the innovation partnerships that local government, federal government, and the private sector in Southern California have pioneered to ensure that these critical assets remain secure. From threat sharing to...
Live Webinar:Secure Mobile Access to Sa...
In this webinar, attendees will learn how Swyft Mobile for Salesforce enables case workers, agents, and government contractors to:Access confidential information about projects and constituents while mobile, both online and offlineSecurely send emails to Salesforce contacts and access Salesforce web links in a secure browserManage cases, opportunities, submit items for approval, and securely share documents with Salesforce and BlackBerry Dynam...
CyberSmart: Preparedness and Proactive...
With cyber threats on the rise, how can governments prepare to prevent, mitigate, respond to, and recover from such attacks? Vigilance against cyber threats requires not only significant investments in hyper-secure technology infrastructure, but also a highly skilled workforce. In Austin, hear from the federal, state and local leaders who are partnering across government, industry and academia to prioritize cybersecurity readiness through tec...
April 2, 2019
Organizer:
Carahsoft Location:
Austin, TX
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.