Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer:
FedInsider Location:
Webcast
APEX, CMMC and Project Spectrum
Securing government contracts is becoming increasingly challenging due to stringent requirements such as FedRAMP and CMMC. If your clients aim to secure contracts with the DoD, join us for this timely web discussion, hosted by Cyturus, in collaboration with Carahsoft and The Cyber AB, exclusively for APEX Accelerator Consultants. This session aims to equip APEX Consultants with resources specifically designed for APEX consultants and their cli...
Piercing the Near-Peer Cyber Perimeter:...
In today's world, protecting national security requires understanding the global cyber operations landscape, particularly the activities of Great Powers countries. SpyCloud's Identity Intelligence offers a unique perspective into this challenging space, helping to uncover the tactics and trends used by advanced actors. This event will showcase an in-depth analysis of compromised data, revealing connections beyond traditional near-peer threats....
Optimizing IT Operations: Advanced ITSM...
U.S. Federal Government agencies need flexible software solutions capable of optimizing IT operations. By integrating Atlassian's enterprise tools into existing IT environments, teams can create customizable workflows to fit their specific needs. Join Atlassian experts in this webinar on June 12th and gain the knowledge to: Integrate scalable tools like Jira Service Management into your workflow Automate repetitive tasks with proven scalab...
Smooth Roads Ahead: Making Complex Tran...
We understand. Transportation agencies face increasing challenges in building, maintaining, monitoring, and repairing critical infrastructure. Rising project costs, a limited workforce, and tight project timelines can make each project more daunting. Innovative solutions like MicroStation are essential to navigating these hurdles effectively. Join us for a complimentary webinar to explore how MicroStation’s cost-effective CAD software pl...
Leveraging Tableau Stories and Dashboar...
CoSN has unveiled its groundbreaking Digital Equity Dashboard with data curated by Innive K12 360° to empower school districts and communities to harness data in their pursuit of bridging digital equity gaps. This robust dashboard, created in Tableau and leveraging the power of Tableau Data Prep, seamlessly amalgamates multiple national datasets, presenting them within a singular, cohesive dashboard. Join us in exploring the transformative...
Defense One Tech Summit
Technology is reshaping the future of war, from undersea to outer space, and more than ever, commercial companies are shaping technological trends. We'll explore how recent developments in artificial intelligence have upended expectations for AI-powered tools, and how the Pentagon continues to press for advances in a dozen emerging technology areas. Join Defense One’s 9th Annual Tech Summit to learn how innovations of today and tomorrow...
June 18, 2024
Organizer:
Defense One Location:
Arlington, VA
F5 BIG-IP Next - Explore the Next Gener...
Join F5 and Iron Bow at Rocket City Tavern on Tuesday, June 18th for a hands-on lab featuring BIG-IP Next. What you will learn: We invite all BIG-IP users to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees will receive a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use case...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.