Microsoft Discovery Hour: Power Your AI...
Join us at Microsoft Discovery Hour: Power Your AI Transformation with the Microsoft Cloud to discover how AI is shifting how we think of work for every individual and every team across every industry. During this free event, you’ll learn from Microsoft experts as they share how you can put AI to work to enhance employee experiences, reshape business processes, reinvent customer engagements, and stay ahead of innovation to drive business...
April 25, 2024
Organizer:
Microsoft Location:
Webcast
Haystack CTF: The Hunt for IOC's
Immerse yourself in the world of Intrusion Detection in our new Blue Team game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss! An up-and-coming hacker prodigy known as Leopold falls into debt with The League after unsuccessfully trying to hack into The League's network to exploit th...
Securing and Managing Non-Human Identities
Non-human identities are essential components of any organizational landscape, yet their security risks are often underestimated. Just like user accounts, they require constant surveillance and protection. In this webcast, experts dive into the world of non-human identities, including bots, DevOps, certificates, service accounts, API keys, machine identities and more. Join us to: Discover the roles and vulnerabilities of non-human identities L...
Set It and Forget It: Practical Automat...
Do you have too many Security Analysts and Engineers sitting around with nothing to do? We didn't think so; you are not alone. You may have heard how security automation can elevate your team and help move you from playing defense and reacting to incoming threats. Go on the offensive, get empowered, and get in control of your security operations to achieve your strategic goals. Splunk’s Security Orchestration, Automation, and Response (S...
How Digital Playbooks Propel Federal Mo...
Successful federal modernization requires an artful blend of people, process, and technology—with a relentless focus on enabling business transformation. A “digital playbook” can provide a comprehensive guide to the process, describing both overarching strategy and tactical approaches. Using a templatized technology strategy can boost mission outcomes while humanizing data-driven modernization and leveraging artificial intell...
April 25, 2024
Organizer:
FedInsider Location:
Webcast
CTO Sessions: Quantum-Resistant Code Signing
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a requirement to support them by 2025. SP 800-208 requires that all stateful HBS key generation and signature algorithms b...
Unlock the True Power of Zero Trust thr...
In today’s digital landscape, corrupt content poses unprecedented challenges to cybersecurity. The mass proliferation and fragmentation of content communication systems (file-sharing services) has created threat opportunities that must be addressed urgently. Register now to learn how Kiteworks-enabled Private Content Network (PCN) and Forcepoint’s Zero Trust Content Disarm and Reconstruction (CDR) has combined to create a groundbre...
Service Branch Spotlight: Marines
Operating in the vast Pacific region presents a variety of unique challenges, particularly as tension in the theater increases. Join Defense One as we speak to U.S. Marine Corps Forces, Pacific about how the Marines are preparing for future conflicts and contingencies in the region.
April 25, 2024
Organizer:
Defense One Location:
Webcast
The 2024 Gartner Leadership Vision: Ent...
Organizations continue to operate in a turbulent environment, bearing the brunt of economic headwinds, breakneck technology acceleration and jarring operating model change. Under these conditions, only 18% of enterprise architecture (EA) leaders believe their practice is exceeding CIO expectations. EA's role must rapidly evolve to address the needs of the entire organization and will require new skills and competencies to realize widespread va...
April 26, 2024
Organizer:
Gartner Location:
Webcast
Protect California State & Local Govern...
In challenging economic times, government budget officials frequently look at IT as a target for cost reduction, as they often underestimate the value of IT to mission objectives. Historically, many government CIOs, including in California, have done a poor job of connecting what IT does to support these mission outcomes and therefore lack credibility to either defend against draconian cuts or to grant the request with reductions that minimize...
April 26, 2024
Organizer:
Gartner Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.