323 past events found
Back to Search Begin New Search Save Search Auto-Notify
Developing a Trade Compliance Program
Developing a Trade Compliance Program Building a Global Compliance Program will teach practitioners how to assess their organization and build a foundational compliance program to mitigate their specific import and export risks. Drawing from guidance from CBP, BIS, DDTC, and the instructor’s own experience, attendees will learn the basics of import and export compliance programs along with best practices and pitfalls to avoid. This cours...
Add Favorite
Bridging the Cybersecurity Talent Gap i...
Navigating the unique challenges of the government and public sector demands a specialized approach to cybersecurity talent. This session will unveil groundbreaking methods, from upskilling your current team to leveraging a pre-vetted cybersecurity talent pool. We'll also explore government-funded cybersecurity training programs to enhance your workforce. Note: There is a way for your partners to also promote and sell bootcamps and talent, but...
Add Favorite
Debunking False Claims on the Cyber Bat...
Following the tragic events in the Middle East in October, a spectrum of cyber actors turned to social media to express their sentiment surrounding the crisis. Shortly thereafter, hacktivists joined the fray, engaging in defacements and Distributed Denial of Service (DDoS) attacks on various nation-state websites. While many of these claims were legitimate, others were later debunked, underscoring the importance of verification and validation...
Add Favorite
Security and Compliance in 2024: Trends...
A content management system (CMS) is a key piece of the foundation for building modern digital experiences that span farther than just your website today. Global brands such as Mars, Stanley, Black & Decker, NASA and many more have trusted Drupal as their CMS to power their brand differentiating experiences. However, with a rise in cyber attacks, the security of your digital platform is critical. Join us for an insightful conversation with...
Add Favorite
Harnessing the Power of E-Signatures: E...
Adobe Acrobat Sign is an electronic signature platform that supports custom workflows and settings for securely sending documents for signatures and tracking their status. The use of such solutions has been trending due to the ease of use, quick turnaround time, and cost-effectiveness. As such, electronic signature adoption within government agencies remains on the rise. Discover how to digitize documents and workflows with Adobe Acrobat Sign...
Add Favorite
Here There Be Dragons: The Role of GenA...
It’s a time of discovery. But will the currents of legislation and business combine with the tides of technical innovation to push us off the map of the “known world”? Will they create new opportunities? FedRAMP authorization is the path to the FedRAMP Marketplace, the world’s largest opportunity for SaaS applications and services. This marketplace serves hundreds of U.S. agencies and departments by setting standards fo...
Add Favorite
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks? The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. Jo...
Add Favorite
Focus on What Matters Most With Trusted...
As threat actors continue to probe for weak points and develop new ways to penetrate or circumvent traditional IT defenses, forward-thinking cybersecurity experts have expanded their intelligence programs to cut through the noise and disrupt threats before they impact the business. Optimized for both user and technology workflows, intelligence from Recorded Future provides real-time context on who is attacking, their motivations and capabilit...
Add Favorite
Mayhem to Magic: How to Meet the Mandat...
In the last three years, the number of released cybersecurity mandates has doubled. From EO 14028, to BOD 23-01, 02, and (likely soon) 03, not to mention M-21-31 and M-22-09, these mandates are rarely backed with funding or staffing to help meet the reporting requirements. Rarely do agencies have the tools to report outcomes easily and in a trustworthy way. The result? Many agency CISOs and CIOs are left to fulfill an onslaught of mandates wi...
Add Favorite
MOSAICS and the Future of Industrial Cy...
As the vulnerability of industrial control systems (ICS) to cyberattacks continues to have a clear impact on infrastructure security, emerging security solutions are essential to the future of industrial cybersecurity. MOSAICS – More Operational Situational Awareness for Industrial Control Systems – is the working prototype demonstrating an integrated capability for ICS operational defense. This roundtable discussion pulls together...
Add Favorite
Back to Search Begin New Search