Fortress in the Cloud: Building Zero Trust
In today's increasingly complex cloud landscape, securing your environment requires a fundamental shift from traditional castle-and- moat defenses to a zero trust approach. This webinar, co-hosted by Palo Alto Networks and AWS, will guide you through the essential concepts of zero trust security and explore how Palo Alto Networks and AWS can empower you to achieve it. During this webinar, attendees will: Understand the core principles of zero...
Tableau Server to Cloud: Lift & Shift v...
Is your on-premise Tableau Server hindering your data analysis capabilities? Tableau cloud beckons with faster analytics, scalability, security and simplified management, but migrating your entire Tableau environment can feel daunting. This upcoming webinar cuts through the confusion, unpacking the two main migration approaches viz: Lift & Shift and Tool-based migration. Come join Joseph Bernardo, Vice President of Data Value at USEReady,...
Trellis Data's Secure Speech: Secure Tr...
In the age of AI, government agencies need an accurate, efficient, and flexible speech-to-text service customizable for specific use cases, languages, dialects, and environments while maintaining full data custody. Join us to discover Trellis Secure Speech's powerful user features including keyword searching, real-time alerts, dynamic speaker ID, language identification, and translation between multiple languages. Additionally, learn how Trel...
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, aims to delve into the nuances of GAI, particularly focusing on its utilization by...
Cohesity Cyber Incident Workshop
Joining Cohesity for an exclusive half-day workshop, participants will be guided through a comprehensive cyber event simulation. Throughout the workshop, they will triage, diagnose, and respond to simulated cyber threats, reflecting on the incident response process and exchanging perspectives and best practices with experts and fellow participants in Operation Stormfall. It's not just about preparedness; it's about empowerment, as atte...
GitLab Training: Security Essentials fo...
Have you considered becoming a GitLab Certified Professional? GitLab is coming to Reston, VA on Monday, June 10, for a hands-on training covering all of the essential security capabilities of GitLab and tailored to the Federal Systems Integrator community. This course will offer live instruction on critical security techniques, including Static Application Security Testing, secret detection, Dynamic Application Security Testing, dependency sc...
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
Techno Security & Digital Forensics Con...
Techno Security & Digital Forensics Conference has been the most important gathering of private sector and government attendees dedicated to the digital forensics and computer security industries. But Techno is more than a conference. It’s where the community comes together to learn, network and share. As our flagship event in Wilmington continues to grow, we look forward to celebrating our 25th year and collaborating with leading ag...
Tidelift is Hosting Upstream: A One Day...
Upstream 2024, hosted by Tidelift, is set to tackle the persistent challenges of improving the health and security of open source software through a virtual symposium focused on pioneering technologies and unconventional solutions. Tune in on June 5 to take part in innovative discourse, connecting thought leaders, open source maintainers and visionaries from diverse fields. By attending this virtual event, you can expect to: Learn emerging and...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.