Cohesity Cyber Incident Workshop
Joining Cohesity for an exclusive half-day workshop, participants will be guided through a comprehensive cyber event simulation. Throughout the workshop, they will triage, diagnose, and respond to simulated cyber threats, reflecting on the incident response process and exchanging perspectives and best practices with experts and fellow participants in Operation Stormfall. It's not just about preparedness; it's about empowerment, as atte...
Federal TX Practitioners Workshop
Register now to hear directly from product management and expect to take away improved skills and knowledge to be successful with Strategic Portfolio Planning, Investment Funding, Innovation and Demand Management, Project Management, and Agile Development. Attendees can also expect great networking opportunities with colleagues in other agencies. Topics Covered Include:What’s new in SPM?Roadmap Strategy: How to create a strategic plan an...
TX Practitioners Workshop
Register now to hear directly from industry and subject matter thought leaders and take away improved knowledge, skills, and abilities to help you make better decisions related to what applications provide the most value to your agency and to help you match business capabilities to strategy. Attendees can also expect great networking opportunities with colleagues in other agencies. Topics Covered Include:What’s new in APM?APM Roadmap (Wh...
Anchore VIPERR Workshop
Developing concrete processes and controls to secure your organization's software supply chain can absorb massive amounts of time and resources without guaranteeing significant security improvements. Enter VIPERR, an actionable software supply chain security framework developed by Anchore, synthesizing lessons learned from supporting the most challenging software supply chains across government agencies and the defense industrial base. Join An...
F5 BIG-IP Next - Explore the Next Gener...
Join F5 and Iron Bow at Rocket City Tavern on Tuesday, June 18th for a hands-on lab featuring BIG-IP Next. What you will learn: We invite all BIG-IP users to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees will receive a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use case...
Federal TX Practitioners Workshop
Join ServiceNow for a dedicated technical practitioners workshop focused on how to use ServiceNow’s Software & Hardware Asset Management (SAM & HAM) to enable agencies to optimize costs and utilization of their asset investments to reduce spend, mitigate asset risk, and automate the full asset lifecycle with workflow — on a single platform. Register Now to hear directly from our asset management experts and expect to take a...
Federal Low-Code App Engine Innovation...
Join us in-person for a full day hands-on Low-Code App Engine Innovation Workshop to see how organizations are re-imagining their approach to automation and app development with ServiceNow's Creator Workflows. Learn how to boost productivity at scale by building high-value low-code mission apps with App Engine. Whether you're a pro developer of any level looking to streamline repetitive tasks, a low-code business analyst looking for ways to s...
Lunch and Learn on Enhancing Public Sec...
We invite you to an exclusive briefing session focusing on the critical issue of security debt within federal applications. Hosted by Veracode, a leading authority in software security, this event will provide insights and strategies for addressing security challenges unique to the public sector. Veracode’s State of Software Security 2024 report sheds light on the pervasive issue of security debt in today’s applications, serving as...
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer:
GovExec Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.