Back to Search Begin New Search Save Search Auto-Notify
Technology - The Bridge Between Governm...

CANCELED

Every year much is written about just how much agencies spend on maintaining outdated legacy systems. Every dollar spent on keeping obsolete systems running means less is available to invest in IT transformation, blocking the new technologies and applications that Americans have come to expect. Unfortunately, the underlying structure of the federal budget process historically has made it extremely difficult to break the cycle. By shifting to t...
June 16, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersmart Series: Securing the Cloud
Securing the Cloud Join Securonix on June 16th as we host a virtual event focusing on the Cybersmart Series: Securing the Cloud. Increased reliance on technologies that advance worker productivity from anywhere has seen cloud computing become one of the key opportunities for development over the past few years. In this online event, we’ll talk with a number of federal and local officials to learn more about how they’re using cloud...
June 16, 2021
Organizer: Securonix
Location: Webcast
Add Favorite
Rethinking Remote Work in the National...
The pandemic may have crushed the daily commute in every sector, but it did not change the national security mission of the Intelligence Community or the Department of Defense. Those elements of the federal government suddenly faced the challenge of how to implement remote solutions for employees working on classified or sensitive assignments without jeopardizing their objectives. The Intelligence and National Security Foundation concluded rec...
June 15, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Digital Risk Reconnaissance Across the...
Organizations face a myriad of risks brought about by the digital transformation of their business. These risks include digital fraud, data theft exposure, social media impersonations and phishing attempts within social media and the hidden areas of the open, deep and dark web.Join CrowdStrike's upcoming Tech Talk as they go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better pr...
June 15, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Integrating and Applying the MITRE ATT...
SentinelOne is FedRAMP Moderate authorized and on the Continuous Diagnostic & Mitigation Approved Product List. Join MITRE Engenuity ATT&CK expert Jared Phipps for a deep dive into the results of the 2020 ATT&CK (Carbanak & FIN7) evaluation. Learn more about the emulated attacks, relative vendor performance, and how to integrate the ATT&CK framework into your security program. During this webinar, you will learn: What the M...
June 15, 2021
Organizer: SentinelOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Splunk Security Ninja Workshop EMEA Ser...
Please note these workshop take place during European working hours. Dates/Times: Tuesday 15th June, 09:30 - 14:30 BST/ 10:30 - 15:30 CEST Introduction: Welcome to Splunk Security Ninja Workshop Series. These 4 hour, hands-on security workshops are brought to you by the Splunk team via Zoom. Learn, connect & interact with Splunk subject matter experts, colleagues and industry peers, and have some fun on the way! Virtual hands-on workshops...
June 15, 2021
Organizer: Splunk
Location: Virtual
Add Favorite
Come Back Stronger: The Role of Technol...
State and local governments are on the front lines of delivering an economic recovery from the pandemic. The pressure is on to act quickly and decisively. Technology will play a critical role in getting financial help to people who need it, and it’s also an important part of helping government organizations improve accountability, transparency and equity. Join us June 15 at 11 PT/2 ET as we sit down with former Gov. Martin O’Malley...
June 15, 2021
Organizer: Government Technology
Location: Webcast
Add Favorite
Beyond The Customer Requirement: Seizin...
From healthcare and pharma to manufacturing and IT, many industries are affected by supply chain risks requiring additional oversight. Several critical procurements have already obligated government contractors to disclose measures taken to assess and minimize supply chain risks. It’s clear that agencies and government contractors are going to be subject to increasing scrutiny to know exactly where products, components, and services are...
June 15, 2021
Organizer: Deltek
Location: Webcast
Add Favorite
The Department of the Interior: Tableau...
Gathering lots of data is easy in today’s environment—most programs are already collecting more than they can handle. How that data is used to make better decisions on mission-critical programs is harder. The President’s Management Agenda makes it clear that agency data should be used strategically to improve performance, identify inefficiencies and cost savings, and provide transparency. Building a culture of analytics, incl...
June 15, 2021
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Vulnerability Management Metrics Part 2...
In Part 1 of this series, MGT516 course author Jonathan Risto discussed what makes a good metric and provided 5 metrics to start measuring within your vulnerability management program, regardless of your program maturity. In this second part of the Vulnerability Management series, MGT516 course author Jonathan Risto will discuss the following metrics: Mean Time to Resolve Average Exposure Window Vulnerability Reopen Rate and why these advanced...
June 15, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search