Back to Search Begin New Search Save Search Auto-Notify
Building a Cloud Security Culture - Mer...
To innovate faster, you need the right tools to unlock the ability to adapt and scale quickly. Most importantly, you need the right security levels to get there. Throughout this course, we’ll talk about the benefits and capabilities of DevOps, as well as how to appropriately integrate security into DevOps to fuel innovation. We’ll complete the course by featuring the baked-in security controls available on AWS and highlight the key...
Add Favorite
Unified Response: Government & Industry...
The federal government, industry, and the critical infrastructure organizations they run face a common and unprecedented threat -- sophisticated and often crippling cyber-attacks that show no signs of slowing down. It’s a challenge complicated by a significant shortage of skilled cyber-security professionals and varying levels of organizational preparedness. This summer, lawmakers introduced the bipartisan International Cybercrime Preven...
Add Favorite
Scaling Digital Defenses: The Building...
Government agencies continue to expand their digital service offerings, making it easier than ever before for the public to access critical benefits and services online. However, this rapid expansion of digital services has opened the door to unprecedented identity fraud and abuse, costing billions of dollars. In many cases, additional customer friction was introduced for identity verification processes as a mechanism for reducing fraud. But t...
Add Favorite
2022 - FAR Supplement - DIAR - Interior
FAR Agency & Department Supplement - Webinar Series Complimentary & Recorded Find recordings on our website and YouTube Channel Sponsorships available at hello@jenniferschaus.com
Add Favorite
Export Controlled Technology and Techni...
Course Summary U.S. Export Controls: This practitioner-level course introduces users to the regulatory requirements for identifying when technical information is export controlled and the appropriate marking of such information. It also includes the critical factors to be considered and the role an effective technology and technical data management process has in a company’s overall compliance program. The course provides an overview of...
Add Favorite
Navigating the Horizons of Aerospace an...
This webinar will explore the benefits and challenges of manual software testing versus automated software testing in the defense and aerospace industries. Participants will gain a comprehensive understanding of the differences between these two testing approaches, including their respective advantages and limitations. We will discuss the role of manual testing in ensuring the safety and reliability of critical defense and aerospace systems, a...
Add Favorite
Driving Efficiency & Reliability for Mi...
In the fast-paced aerospace and defense software development landscape, continuous integration and continuous delivery (CI/CD) have become critical for ensuring high-quality, error-free software releases for military systems such as avionics, radar, communications, etc. However, achieving CI/CD can be a daunting task, especially when it comes to software testing. Manual testing can be time-consuming, prone to errors, and cannot keep pace with...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Transforming Authentication: From Execu...
The Executive Order M-22-09 mandates that all government agencies and contractors doing business with the government must implement phishing-resistant MFA for employees, contractors and citizens online applications by fiscal year end 2024. NIST, CISA, and NSA have recommended a FIDO-based approach as the best option. Together UberEther and Nok Nok provide the platform and expertise to address the executive order, and make it easy for you to ac...
Add Favorite
Back to Search Begin New Search