Back to Search Begin New Search Save Search Auto-Notify
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks?. The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. V...
Add Favorite
Harnessing Knowvation CSP for Geospatia...
PTFS, AWS & Carahsoft hosted a webinar in the lead up to DoDIIS 2023 in efforts to explore how agencies can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Attendees of this on-demand webinar explored topics inlcuding, AI/ML Text Extraction Document Summarization Machine Learning Document Classification AWS AI/ML Image and Video Recognition The Integration of Knowvation CSP with AWS AI/ML
Add Favorite
Tetrate DoDIIS Webinar: Simplify Kubern...
Managing applications in Kubernetes can be complex. Tetrate’s Service Mesh makes inter-service communication, traffic control, observability and security easier. During this webinar, Tetrate discussed how the Service Mesh addresses challenges that can occur with Kubernetes, making it scalable and flexible. Tune in to this on-demand webinar for insights on: Empowering your organization with Zero Trust security through the Service Mesh Pra...
Add Favorite
Harnessing Compliance as Code: The Futu...
In the fast-evolving ecosystem of the Department of Defense, the way we perceive and manage compliance requirements is undergoing a paradigm shift. Compliance as Code emerges as the frontrunner to challenge traditional, manual vetting methods. Modern practices directly embed these prerequisites into infrastructure and application development processes. This offers the unique advantage of automated evidence collection, streamlining security rev...
Add Favorite
Cyber Security Strategies and the Impor...
With cyberattacks increasing in quantity and sophistication it is becoming more important for all government entities to develop a proactive and resilient data security risk management strategy. Developing a focused approach specific to edge computing environments is increasingly important because these areas can pose the most significant levels of security risk as they are not fully encompassed by the organization’s perimeter. Watch thi...
Add Favorite
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks?. The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. V...
Add Favorite
DoD Modernization Through Automation: L...
Attendees learnded how to harness the power of Red Hat automation and Linux technologies to drive modernization efforts within the U.S. Army Corps of Engineers (USACE). These powerful tools can not only automate routine tasks but also enforce the security standards mandated by the Defense Information Systems Agency (DISA). This hands-on on-demand training provided the ability to enhance security posture while streamlining operational processes...
Add Favorite
Cybersecurity for Industrial Control Sy...
In this on-demand webinar, attendees learned about: Comprehensive threat detection to identify potential risks promptly Proactive attack prevention to physically block cyber attacks before they can compromise your critical infrastructure Enhancing overall operational efficiency while building resilience against cyber threats
Add Favorite
How Salesforce Delivers Precision Sustainment
Unfortunately, we have reached capacity for this event. To defend the nation against increasingly agile and sophisticated threat actors, the US Army must have the right equipment at the right time and right place with the highest readiness possible. Without a way to collect and synergize real time data regarding personnel, equipment, or maintenance in one accessible platform, defense leaders will have to make decisions based upon less-than-opt...
Add Favorite
Advancing Technology and Innovation For...
The US Department of Commerce is responsible for promoting economic growth, job creation, and international trade. It has a wide range of responsibilities and 13 different bureaus and offices. These include Census Bureau, National Institute of Standards and Technology (NIST), National Oceanic and Atmospheric Administration (NOAA), Patent and Trademark Office (USPTO), and others. The CIO of the Department of Commerce is responsible for developi...
Add Favorite
Back to Search Begin New Search