Google Workspace California Webinar Series
In this webinar series, we will cover the following topics and more: Google Workspace for Government How Google Does Security GenAI - Realistic ways to make it work for you
Dual-Use Technology: Accelerating Capab...
In an era where technology advancements are both rapid and revolutionary, distinguishing between civilian and military applications poses significant challenges and opportunities for national security, foreign policy, and global technological leadership. This webinar delves into the intricacies of dual-use technology, spotlighting the urgent need for innovative approaches to identify, regulate, and leverage these technologies in bolstering sec...
Bolster Identity Security with Password Safe
Attacks on identities, especially those with elevated access and privileges, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. In this perimeter-less, remote world, organizations need a higher degree of privileged access protection that eliminates the ability for attackers to gain access and move laterally. A zero tru...
Michigan Defense Expo (MDEX)
This year, we’re adding another day to MDEX! This event brings together representatives from TACOM (Tank Automotive Command) and the Detroit Arsenal, along with other key players in the defense industry. We are bringing back the APBI (Advanced Planning Briefing for Industry) and have coordinated with AUSA for their Annual Breakfast. MDEX offers a unique opportunity for attendees to interact with decision-makers and experts from various o...
Adobe ColdFusion Summit East 2024
Save the date to join Adobe and Carahsoft for our interactive Adobe ColdFusion Summit East 2024, the premier event for coders to exchange ideas, inspiration, and experiences with peers and thought leaders. It is now returning after a hiatus of three years to Washington, DC! Mark your calendars for the opportunity to engage with innovators from various government agencies and organizations working towards meeting the demands of the future. In a...
Addressing Digital Document Accessibili...
In March 2022, the U.S. Department of Justice stated“Inaccessible web content and/or documents means that people with disabilities are denied equal access to information. An inaccessible website and documents can exclude people just as much as steps at an entrance to a physical location”. How is your organization addressing document accessibility, security, and usability? How are you leveraging your document as a digital ambassador...
Introducing DocuSign Web Forms
Traditional paper-based or static electronic forms often create challenges for constituents, such as tedious completion processes, errors and incomplete submissions, limited accessibility, and storage difficulties. Join us to hear from experts and share insights on how you can streamline data collection and speed up signing in one interactive experience with DocuSign Web Forms.
Securing Success: RMF and Zero Trust Un...
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it is...
April 25, 2024
Organizer:
ATARC Location:
Webcast
Set It and Forget It: Practical Automat...
Do you have too many Security Analysts and Engineers sitting around with nothing to do? We didn't think so; you are not alone. You may have heard how security automation can elevate your team and help move you from playing defense and reacting to incoming threats. Go on the offensive, get empowered, and get in control of your security operations to achieve your strategic goals. Splunk’s Security Orchestration, Automation, and Response (S...
CTO Sessions: Quantum-Resistant Code Signing
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a requirement to support them by 2025. SP 800-208 requires that all stateful HBS key generation and signature algorithms b...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.