DORA, SPACE and DevEx: Boost Software E...
Software engineering leaders often struggle to evaluate how the metrics frameworks of DORA, SPACE and DevEx will help them demonstrate software engineering performance. The right set of metrics frameworks can help software engineering leaders make data-driven decisions, but only if they align engineering performance with business value. Metrics focused on software engineering processes and activities alone do not provide insights into the deli...
June 18, 2024
Organizer:
Gartner Location:
Webcast
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Join critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics will include: How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and...
Explore Your Entire IT Landscape With I...
Join us to see how you can take charge of your IT infrastructure and digital services with ServiceNow ITOM Visibility. This session dives into how ITOM Visibility not only automatically discovers all of your IT resources, but also maps them to create a single, unified view of your entire IT landscape along with an up-to-date, and consistent record in your ServiceNow CMDB. This powerful combination helps you reduce costs and complexity, while a...
June 24, 2024
Organizer:
ServiceNow Location:
Webcast
Securing Supply Chains: How Data and Te...
In an increasingly connected world, disruptions to supply chains can severely impact the Department of Defense’s ability to sustain readiness and execute missions. Consequently, it's critical to analyze, predict, and mitigate potential supply chain risks through innovation in technology and data. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense indus...
June 25, 2024
Organizer:
GovExec Location:
Webcast
Securing the Municipal Water Supply fro...
Foreign nation state-sponsored cyber group and threat actors affiliated with the Iranian Government have carried out malicious cyber-attacks against multiple critical infrastructure entities; this and other nation state “bad actors” have their eyes on this precious resource. In one case, hackers targeted and disabled a common operational technology (OT) used at water facilities. Unfortunately, these facilities often lack the resour...
Digital Transformation: Are We Truly Re...
Digital transformation has become a north star for organizations looking to become more efficient and intelligent. It aims to shift organizations from siloed systems to streamlined enterprise solutions, promoting data democratization and automation. This evolution was expected to enhance efficiency, accessibility and support. But have we achieved these goals? A key digital transformation success factor is a comprehensive data management system...
Revolutionizing Cloud Data Security wit...
As data volumes continue to soar and regulations become increasingly stringent, organizations grapple with the challenge of comprehending their sensitive data, controlling access to it and pinpointing potential vulnerabilities. To regain visibility and control, forward-thinking organizations are turning to data security posture management coupled with data detection and response. In this session, you'll learn:The security and compliance risks...
Considerations for Strategic, Accelerat...
Join us June 27 for an insightful webinar tailored for technical leaders. Our experts will unravel the foundational steps and key decisions that are crucial for launching successful AI ventures. In this session, we’ll explore how a well-designed data storage platform optimized for AI serves as the backbone for AI-powered innovation and operations. What you’ll learn:Efficient end-to-end AI workflows with industry examples and use ca...
How to Create an Optimal Data & Analyti...
The potential of data and analytics (D&A) to transform businesses is increasingly recognized across industries. To position their teams as a business discipline that can fulfill cross-functional use cases, data and analytics leaders must optimize their organizational model. However, as organizations scale and expand their D&A initiatives, they often encounter significant challenges, such as skills and staff shortages—the third ma...
July 2, 2024
Organizer:
Gartner Location:
Webcast
Efficiently Protect, Monitor, and Contr...
Privileged passwords and credentials are the gateways to an organization's most valuable assets. They unlock access to privileged accounts used to manage critical devices, applications, DevOps infrastructure, and other assets across the enterprise. They pose significant risks if not protected, managed, and monitored properly. Today, many government organizations still rely on spreadsheets, manual processes, or a combination of solutions to man...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.