Back to Search Begin New Search Save Search Auto-Notify
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Securing Our States: Core Pillars of St...
Forward-thinking state and local governments are participating in the State Risk and Authorization Management Program (StateRAMP) as they build out a robust and secure IT infrastructure. Modeled after the federal government's FedRAMP, the nonprofit membership organization uses independent audits and continuous monitoring to verify that cloud services satisfy standardized state government security requirements and can be used by agencies in mul...
June 26, 2024
Organizer: Route Fifty x The Atlas
Location: Webcast
Add Favorite
Unlocking the Revisions to the Uniform...
The federal funding environment has changed rapidly for the past several years, prompting a review of Uniform Grants Guidance (UG) by the US Office of Management and Budget (OMB). In April, OMB released sweeping changes to UG for grant recipients. This webinar will describe how modifications to the Notice of Funding Opportunities and Federal Program Inventory promise increased accessibility and reduced burden on recipients. Attendees will walk...
June 26, 2024
Organizer: Government Finance Officers Association
Location: Webcast
Add Favorite
Certification and Ask-Me-Anything (Open Lab)
Certification and Ask-Me-Anything (Open Lab) REGISTER HERE This week’s lab is set up as Open Office hours for you to attend to get extra help. It's designed to help you get caught up, ask questions, review homework, AMA: ask-me-anything, or anything else you may need support with. LAB TOPIC:What are Small Business CertificationsWhat are the different types of certificationsWhy do you need themHow to team with certified small businessesWh...
June 26, 2024
Organizer: Government Contractors Association, Inc.
Location: Webcast
Add Favorite
TECHSPO Miami 2024 Technology Expo (Int...
Where Business, Tech and Innovation Collide in Miami!TECHSPO Miami 2024 is your chance to … Check out exhibitors showcasing the next generation of technology & innovation. Be inspired, amazed and educated on how these evolving technologies will impact your business for greater growth. Interact with technology enthusiasts, build your network and reunite with your peers. The 10th annual TECHSPO Miami, two-day technology expo returns J...
June 27, 2024
Organizer: TECHSPO Miami
Location: Miami, FL
Add Favorite
High-Bandwidth Oscilloscopes for Multi-...
When warfighters enter the battlefield, whether in the sky, on the ground or at sea, they depend on sophisticated radar and electronic attack jammer systems to protect them from harm. Advancements in digitizing technology and analysis software enable EW systems to undergo testing in the lab before they reach a real conflict. High-bandwidth oscilloscopes can be used for multi-port, coherent RF pulse analysis. With the combination of real-time d...
June 27, 2024
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Streamlining Collaborative Publishing B...
Adobe InDesign is constantly improving to make creatives' workflows simpler - and with Adobe InDesign plus InCopy, collaboration between designers or teams has never been easier. Adobe InCopy lets copywriters and editors make simple design modifications to a document while designers work on the same document simultaneously in Adobe InDesign — all without overwriting each other’s contributions. Join our complimentary webinar to disc...
June 27, 2024
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Revolutionizing Cloud Data Security wit...
As data volumes continue to soar and regulations become increasingly stringent, organizations grapple with the challenge of comprehending their sensitive data, controlling access to it and pinpointing potential vulnerabilities. To regain visibility and control, forward-thinking organizations are turning to data security posture management coupled with data detection and response. In this session, you'll learn:The security and compliance risks...
June 27, 2024
Organizer: Palo Alto Networks
Location: Webcast
Add Favorite
CTO Sessions: How-to Guide for Enhancin...
Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys used to encrypt/decrypt data must be secured, managed and controlled by the data owner. Thales TCT’s CipherTrust Data Security Platform unifies data encryption and unprecedented granular access controls with centralized key management—all on a single platform. This results in fewer r...
June 27, 2024
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search