DevSecOps for Public Sector: A Roadmap...
Join VMware's session February 1st at 11:45am ET as part of Carahsoft's DevSecOps Geek Week. During this session VMware subject-matter experts will address the following questions: What problems can be solved in the public sector to facilitate clear paths to production? Do the experience and implementation differ between the Department of Defence (DoD) and civilian agencies? How can you expedite the process of implementing a software factory?...
Digitizing the POM for Faster Decision Cycles
DoD Leadership struggles to manage and allocate funds for various defense programs across each of its branches of the Armed Forces. There are guidelines to meet, as well as mission analysis, objectives, alternative courses of action and numerous, time-consuming data calls. The Program Objective Memorandum (POM) process requires managing voluminous datasets and reporting, as well as the challenge for perspective on what is currently funded and...
Pub K Annual Review 2022 – Cybersecurit...
The Department of Defense is overhauling its Cybersecurity Maturity Model Certification, while the Department of Justice is ramping up fraud enforcement related to your cyber certifications. Join our panelists for their insights and expectations for 2022.
January 25, 2022
Organizer:
Pub K Location:
Webcast
San Diego, CA: ITAR / EAR / OFAC Compli...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities: This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States export regulations. We will review recent ECR ch...
Industry Perspectives on CMMC 2.0
With recent discussions about changes to the Cybersecurity Maturity Model Certification (CMMC), Defense Industrial Base organizations can be sure that the intent and desired outcome of the program remains. Join this webinar to hear from experts at Carahsoft, Baker Tilly, and Pillsbury on the evolving CMMC program and what this means for the Defense Industrial Base. Topics include: What are the proposed changes with CMMC 2.0? Why should organiz...
Miami: (VIRTUAL and In-Person): ITAR /...
OFFERED BOTH IN A VIRTUAL FORMAT and IN-PERSON: International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities: This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States...
Additive Manufacturing: The Next Genera...
The U.S. military maintains bases in more than 70 countries and territories around the world, some of them in inhospitable or hard-to-reach areas. When a piece of equipment fails – whether a weapon, a radar dish, or something more prosaic like a mess hall stove – getting replacement parts can be difficult and time-consuming, and the delay can cause anything from mild inconvenience to serious problems meeting the mission. Larger bas...
November 17, 2021
Organizer:
FEDINSIDER Location:
Webcast
ICIT 2021 Fall Briefing--Crossing the D...
The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancing the conversation about...
Midwest Cyber Security Alliance Virtual...
Organizations are expected to perform their duty of care by protecting the organization, its clients, suppliers, and the general public from foreseeable harm. Until recently, the jobs of the Chief Information Security Officer, Risk Officer, and Compliance Officer have been challenging to determine what is foreseeable. Fortunately, the data is available to predict the likeliest threat vectors — paths cybercriminals use to gain access to a...
Agency in Motion: DISA's Hybrid Workfor...
The Defense Information Systems Agency is, in many ways, the point of the cyber spear for the Department of Defense. It’s responsible for conducting network operations across all of DOD’s warfighting domains to ensure warfighters’ effectiveness and lethality.Maintaining that sharp edge during the pandemic has required DISA to adjust and evolve its own operations while assisting Defense agencies to ensure their operations cont...
November 15, 2021
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.