2019 State of the Phish Report
2019 State of the Phish ReportPhishing continues to be the number one attack vector. Why? Because it works — all too well. Industries of every kind fall prey to these scams — from financial organizations to government contractors to healthcare firms. Today’s cybercriminals manage to evade even the most sophisticated security technology through carefully planned, socially engineered email attacks that are only getting more adv...
Implementing and Making Zero Trust Easy
Gartner recently recommended that agencies budget and pilot two Zero Trust networking projects in 2019 focused on microsegmentation and a Software-Defined Perimeter. So where do you begin? Join Brigadier General (ret.) Greg Touhill and other cybersecurity leaders at one of our local Tech Talk events designed to assist government in implementing an effective Zero Trust strategy. Key Zero Trust Tech Talk Topics: •Reduce over-privileged acce...
Implementing and Making Zero Trust Easy
Gartner recently recommended that agencies budget and pilot two Zero Trust networking projects in 2019 focused on microsegmentation and a Software-Defined Perimeter. So where do you begin? Join Brigadier General (ret.) Greg Touhill and other cybersecurity leaders at one of our local Tech Talk events designed to assist government in implementing an effective Zero Trust strategy. Key Zero Trust Tech Talk Topics: •Reduce over-privileged acce...
Nuix Government Summit
Join us on May 22nd in Washington, D.C. for the 2019 Nuix Government Summit This informative and educational one-day event touches on the real-world data challenges that government agencies face today. Get ready for a thought-provoking day of learning, networking, and better understanding of how data drives every aspect of government today. Space is limited! Register now to secure your seat at the Nuix Government Summit.
May 22, 2019
Organizer:
Nuix USG Inc Location:
Washington, DC
Face to Face: CDM DEFEND's New Approach...
Since 2013, the Continuous Diagnostics and Mitigation program has provided federal agencies with IT tools for countering cyberattacks on federal government networks. It is no surprise, however, that over the years attacks on government sites have intensified and become more sophisticated. In its new phase CDM DEFEND rolls out tools and services to create a tailored security strategy, as agencies face demands for more visibility and new enterpr...
Productivity Tips: How to Drown Out Dis...
Chatty colleagues, social media, the lovely spring weather visible out the window—your office is an obstacle course of distractions. You need an iron will and superhuman focus to keep your productivity from suffering. With the deck stacked against you, how can you buckle down and focus? GovLoop has you covered with a couple of aces you can keep up your sleeve. Join us online Wednesday, May 22 from 2-3 p.m. ET/11 a.m.-noon PT to learn how...
May 22, 2019
Organizer:
GovLoop Location:
Webcast
Implementing and Making Zero Trust Easy
CANCELED
Gartner recently recommended that agencies budget and pilot two Zero Trust networking projects in 2019 focused on microsegmentation and a Software-Defined Perimeter. So where do you begin? Join Brigadier General (ret.) Greg Touhill and other cybersecurity leaders at one of our local Tech Talk events designed to assist government in implementing an effective Zero Trust strategy. Key Zero Trust Tech Talk Topics: Reduce over-privileged access ...
9th Annual Customer Experience Summit
The federal government has made major strides to improve customer experience over the last few years, from technology advancements that improve airport security to making the Improving Customer Experience with Federal Services a Cross-Agency Priority Goal. And with the passage of the 21st Century IDEA Act, now, it’s on agencies to comply and deliver on the promise of improved digital services before the year’s end. While the agenc...
Charlotte EEOC Training Seminar
Agenda - May 17, 2019Let’s face it, we live in a digital society…a world consumed with social media outlets, followings, followers, tweets, retweets, IMs, DMs, facebook, snapchat, filters, google, facetime, texting, sexting, pics and so on and so on and so on. These actions are forever released into the universe and cannot be taken back. Digital carelessness and lack of digital tact, can also cause liability, complaints, investig...
May 17, 2019
Organizer:
EEOC Location:
Charlotte, NC
2019 Massachusetts Association of Crime...
The 22nd Annual MACA Training Conference is from May 13-17 at the Cape Code Resort and Conference Center in Hyannis, MA. To register, visit https://macrimeanalysts.org/conference.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.