Ready for 2024: How Coordinated Vulnera...
With the 2024 election right around the corner, security and integrity are on your constituents’ minds. HackerOne convened a panel of cybersecurity and election integrity subject-matter experts to give leaders insight into new best practices in coordinated vulnerability disclosure (CVD). During this webinar, we reviewed the success of a recent hacker challenge conducted by the Election Security Research Forum and leading voting technolog...
Harnessing Compliance as Code: The Futu...
In the fast-evolving ecosystem of the Department of Defense, the way we perceive and manage compliance requirements is undergoing a paradigm shift. Compliance as Code emerges as the frontrunner to challenge traditional, manual vetting methods. Modern practices directly embed these prerequisites into infrastructure and application development processes. This offers the unique advantage of automated evidence collection, streamlining security rev...
DoD Modernization Through Automation: L...
Attendees learnded how to harness the power of Red Hat automation and Linux technologies to drive modernization efforts within the U.S. Army Corps of Engineers (USACE). These powerful tools can not only automate routine tasks but also enforce the security standards mandated by the Defense Information Systems Agency (DISA). This hands-on on-demand training provided the ability to enhance security posture while streamlining operational processes...
Mitigating Cyber Threats in Government...
In this on-demand session attendees learned about harnessing the cloud brings for both opportunities and vulnerabilities. This session pivoted around: Showcasing iboss Azure Cloud Security Gateways and its prowess in mitigating cyber threats in the government sector by providing robust Azure infrastructure security. Seamless connectivity to Azure resources and inter-vnet connectivity. Attendees dove into Azure's functionalities, learned about...
DoDIIS Webinar Series:Transforming Geos...
Traditionally, geospatial analytics has been associated with GIS specialists and specialized systems. However, the landscape is evolving rapidly. With the increasing availability of third-party spatial data, such as satellite imagery, organizations are recognizing the importance of harnessing spatial analysis and incorporating it into their descriptive, predictive, and prescriptive workflows. In our modern, multifaceted world, geospatial data...
Navigating Tomorrow's Defense Supply Chain
For defense agencies to prepare for and mitigate high-impact supply chain disruptions, decision-makers must first have clear visibility into their operations and where vulnerabilities exist. As a result, more organizations rely on digital logistics, a transformative approach using data analytics to monitor, anticipate and respond to supply chain disruptions. Given the complexities of global supply chains and the ever-present potential for disr...
Forescout Security Insights Webinar
Nikhil Gupta, Sales Engineer Team Lead, Carahsoft presented an informative and interactive discussion on Forescout policies and a review of all the upcoming Forescout changes on the docket for 2024. During this on-demand session, the following was discussed: New Year, New Policies designed to help you properly collect device information and perform incidence response for any detected high-risk vulnerabilities. 2023 Frequently asked questions a...
Navigating the Future: What's New with...
Attendees of this on-demand webinar learned how you can simplify and accelerate the delivery of infrastructure and applications. With the tsunami of digital initiatives and new apps, today's infrastructure must support current and future business-critical apps and databases wherever they need to be deployed. Nutanix and HPE partnered to empower government and educational organizations to run legacy, modern, and future workloads, wherever it's...
Illuminating the Darknet for Government...
Thank you for your interest in this event. Attendees of this on-demand webinar learned how the darknet can be used to: Track illicit sales of drugs, human trafficking, and cyber weapons Detect potential threats and monitor persons of interest Stay one step ahead of foreign Nation-State adversarial activity and attacks Learn the latest tactics, techniques, and procedures of threat actors to better prevent future cyberattacks on critical infrast...
Migrate, Optimize, and Modernize with V...
Attendees explored the capabilities of VMC on AWS to facilitate faster and more cost-effective cloud workload migration for their agency. They experienced the transformation of applications and infrastructure services using familiar tools and increased scalability. During our in-person workshop, subject-matter experts will review the following topics: Accelerating datacenter evacuations with VMC on AWS Procurement and certifications Customer...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.