Securing the Federal Software Supply Chain
Things are coming to a head within the federal supply chain (and, frankly, every other supply chain) as cyber-attacks become increasingly more common and sophisticated. Join SteelCloud’s COO, Brian Hajost, and TD Synnex Public Sector's Chief Cyber Security Technologist, Don Maclean, as they discuss how to strategize your cyber response: Explore EO 10428, which calls for bold changes to cybersecurity Learn about SBOMs (software bill of m...
Remove Cloud Complexity for Mission-Cri...
CANCELED
If you need to access agency applications easily and securely, the cloud is your solution. But managing a multitude of clouds, and performance, access, and security of each, you’re looking at a complex cloud environment. Join us online Thursday, May 18, at 2 p.m. ET/11 a.m. PT as we speak with experts about how you can create a cloud environment that truly enables your workforce, allowing them to be productive and efficient while being secure.
May 18, 2023
Organizer:
GovLoop Location:
Webcast
Don't Fall Victim to Cyber Threats: Imp...
Forty-three percent of government employees who work from home admit to making a mistake that had security repercussions and 47% say they’ve clicked on a phishing email at work. As the government workforce becomes more dispersed, government is increasingly exposed to new attackers and vulnerabilities. Join us online Thursday, April 13, at 2 p.m. ET/11 a.m. PT to hear about updates to the threat landscape and what your organization can do...
April 13, 2023
Organizer:
GovLoop Location:
Webcast
4 Steps to Building a Strong Identity-C...
Building a foundation for modern security that can meet current and future requirements must remain a top priority for federal agencies. But as agencies pursue both IT modernization and zero-trust security, it’s easy to get lost in the complexities and lose focus. As always, the underlying enabler is identity security. Join us online Tuesday, Dec. 13, at 2 p.m. ET/11 a.m. PT when government and industry leaders will help us cut through t...
December 13, 2022
Organizer:
GovLoop Location:
Webcast
FCW Summit: CDM
As the Continuous Diagnostic and Mitigation (CDM) program matures, it continues to evolve its capabilities to help federal agencies improve their security posture. From access to critical executive dashboards and shared services to guidance on secure acquisition strategy, CDM offerings provide a dynamic approach to fortifying the cybersecurity of government networks and systems. The increased focus on cybersecurity following President Biden...
November 2, 2022
Organizer:
GovExec 360 Location:
Virtual
CyberWeek 2022
CYBERSCOOP PRESENTS CYBERWEEK Join over 10,000 influential leaders from the cybersecurity community at CyberWeek, the nation’s largest week-long cybersecurity festival focused on digital threats, best practices and the U.S. government’s work on improving cyberspace. CyberWeek is an annual movement bringing together top C-Suite leaders from major technology companies, state and federal government agencies, and other influential deci...
October 17-21, 2022
Organizer:
CyberScoop Location:
Virtual
ICIT Virtual Briefing: Software Supply...
ICIT Virtual Briefing: Software Supply Chain Security – Balancing Internal Orchestration with Attack Vectors Along with security controls and AppSec policies, the way you and your teams treat the software you build over time impacts the speed at which you can react to a threat. The truth is that open source software (OSS) is often treated as if it isn’t a security problem—until it is. The log4j vulnerability and the subsequen...
Internal Control & Fraud Prevention Tra...
Welcome to AGA's 2022 Internal Control & Fraud Prevention Training! The Internal Control & Fraud Prevention Training focuses on management’s responsibility for ensuring good systems of internal control, and the role of accountability professionals to minimize the risk of fraud, waste and abuse. Leaders in government and private industry discuss the latest discovery techniques, lessons learned and how governments are cooperating t...
Federal Insights Exchange: NextGen Secu...
The role of Chief Information Security Officer is important making security is front and center in protecting organizations in a post SolarWinds and Log4j world. As the need to share information between different agencies with both connected and disconnected applications increases, agencies need to think beyond DevSecOps and Zero Trust. Existing approaches to building software and the use of automation need to be reevaluated. The Department of...
July 20, 2022
Organizer:
ACT-IAC Location:
Webcast
FIE Session feat. DoJ
Cloud Services: US Marshals Service (USMS) delivery of Law Enforcement Mission The journey from concept to plan to operational services is challenging in any environment, introducing the challenges of security and deputy safety adds to the complexity. Add the demands of various physical environments and 24x7 availability and you have complexity square. Mr. Bruner who has led that journey for the USMS will share with us their experience, challe...
July 14, 2022
Organizer:
ACT-IAC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.