Back to Search Begin New Search Save Search Auto-Notify
Identity and Access Management Successe...
Higher Education faces a unique set of challenges when managing identities, securely connecting users to both SaaS and on-prem applications, and securing campus administrative servers. Complicating matters, colleges and universities service a broad range of personas including staff, faculty, adjunct faculty, admissions applicants, students, alumni, donors, contractors, athletics/arts supporters, and many others who walk across campus every day...
June 11, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Conquering the Authentication Challenge...
As an organization's hybrid-cloud environment continues to expand far and wide beyond their control, the need for a zero-trust model is becoming mandatory. This higher level of digital security morphs identity verification from onetime event to a model where nothing consuming protected information is trusted by default. In this webinar, Andras Cser, VP, Principal Analyst with Forrester, and Kent Purdy and Troy Drewry of Micro Focus discuss how...
June 2, 2020
Organizer: BrightTALK
Location: Webcast
Add Favorite
The 5G Strategic Advantage and the Step...
Join this 60-minute session to learn: An overview of the United States federal government opportunity from 5G. The Nokia Bell Labs Future X architecture and its critical components. Securing 5G for defense networks. Government-focused use cases that explain the advantage pervasive broadband connectivity brings you, including... 5G Base of the future. Smart logistics, warehousing and supply chain operations. The steps to 5G, how you can start n...
June 2, 2020
Organizer: AFCEA International
Location: Webcast
Add Favorite
Public Safety Project Management 101
The IPSA's project management 101 webinar is relevant to aspiring, new and seasoned public safety project managers. Section 1: Overview Core ConceptsWhy Project Management is ImportantShort term and long term projects Section 2: Project Plans and Schedules Scope StatementsDeliverables, Milestones and TimelineBudgetsRisks and Risk Mitigation Section 3: Successful Management Managing a Project TeamEffective CommunicationsNavigating PoliticsMista...
May 27, 2020
Organizer: IPSA
Location: Webcast
Add Favorite
The Voice of the CPO: The Case for Movi...
A trillion dollars spent on perimeter protection is clearly not effective in securing organisations against breaches. The inspiring Nico Popp elucidates the need to move from outside-in to inside-out security on a whiteboard. You will learn: What every security practitioner will be encountering in the not so distant future Where the limits of endpoint, network, cloud or email security lie Why the most successful strategies involve a focus on people
May 20, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
May 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Implementing Zero-Trust in the Enterprise
Perimeter security is now longer sufficient. The cloud adds complexity, fluidity, and nuance to network security. A zero-trust network helps keep your people and data safe by treating all networks as untrusted. Join us as Dr. Cunningham, Principal Analyst at Forrester, and Nico Popp, Forcepoint’s Chief Product Officer, discuss the disconnect between security, operations and business and offer insights on how to build and implement a zero...
May 13, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Understanding an Open Organization
Red Hat Three Part Webinar Series Many of our customers have faced challenges with the adoption of new open technology due to their organizational culture. In fact, in a recent Harvard Business Review study, culture was the largest barrier to organizations digital transformation. This series of 3 interactive webinars will share areas of where you may be able to be more open and some actions you can take to move forward in your digital journey....
May 12, 2020
Organizer: Red Hat
Location: Webcast
Add Favorite
The Basic Concepts of ELINT
The Basic Concepts of ELINT Thursday, May 7, 2020 14:00 -15:00 EDT Modern Electronic Warfare as is commonly defined is made up of 3 key components: Electronic Attack (EA), Electronic Support (ES), and Electronic Protection (EP). However, Electronic Warfare heavily relies on Electronic Intelligence (ELINT) and the data it provides including radar operating parameters, waveform details, geo-location, and other pertinent information. This sessio...
May 7, 2020
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Emergency Responder Physical & Mental W...
Due to their occupation, emergency responders have unique and elevated physical and mental health risks when compared to the general population. During this current global pandemic crisis, these duty-related risks are compounded with added physical and emotional stress. Maintaining general wellness becomes a significant challenge all emergency responders need to be cognizant of, manage and overcome in order to preserve their general health. Ch...
May 6, 2020
Organizer: IPSA
Location: Webcast
Add Favorite
Back to Search Begin New Search