The Evolution of ATO and Workflows that...
Keeping in line with the Agile manifesto, Secure Development of software within the Government Tech community is improving as we gain direct experience through the process of its development. Secure Development Lifecycles, the addition of "Sec" to form DevSecOps and the molding of traditional Authority to Operate (ATO) to the application of modern continuous integration/continuous delivery operations has birthed a GovTech community pushing th...
Techno Security & Digital Forensics Con...
Techno Security & Digital Forensics Conference has been the most important gathering of private sector and government attendees dedicated to the digital forensics and computer security industries. But Techno is more than a conference. It’s where the community comes together to learn, network and share. As our flagship event in Wilmington continues to grow, we look forward to celebrating our 25th year and collaborating with leading ag...
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. Reserve a spot and earn up to 3 Continuing Professional Education (CPE) credits by taking th...
CyberSmart 2024: Cybersecurity Excellen...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
June 13, 2024
Organizer:
FedInsider Location:
Austin, TX
F5 BIG-IP Next - Explore the Next Gener...
Join F5 and Iron Bow at Rocket City Tavern on Tuesday, June 18th for a hands-on lab featuring BIG-IP Next. What you will learn: We invite all BIG-IP users to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees will receive a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use case...
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer:
GovExec Location:
Virtual
Zoom at the GovForward ATO & Cloud Secu...
Join Zoom and Carahsoft on Thursday, July 11th for GovForward's 6th Annual ATO and Cloud Security Summit! During the 2024 GovForward: ATO and Cloud Security Summit, you’ll hear from experts about the improved program changes and understand how advancements at the federal level are impacting the broader public sector market, including the Department of Defense and state & local governments. Attendees will leave with a better under...
Overview of the CMMC Compliance Model
Join us for a compelling 2-hour overview CPE training event where we will dive into the world of the Cybersecurity Maturity Model Certification (CMMC). This program, being developed by the Department of Defense, is an assessment framework and assessor certification program aimed at enhancing trust in compliance measures related to cybersecurity. In this overview, we'll provide key insights into the Cybersecurity Maturity Model Certification (...
Using the Yellow Book for the Governmen...
Enhance Your Government Auditing Skills with the Yellow Book Are you a government auditor looking to enhance your skills and stay up-to-date with the latest industry standards? Look no further than our comprehensive training event designed specifically for government auditors like you. In this training, we aim to provide you with the knowledge and skills necessary to effectively utilize the Yellow Book, also known as Government Auditing Stand...
Overview of the CMMC Compliance Model
Join us for a compelling 2-hour overview CPE training event where we will dive into the world of the Cybersecurity Maturity Model Certification (CMMC). This program, being developed by the Department of Defense, is an assessment framework and assessor certification program aimed at enhancing trust in compliance measures related to cybersecurity. In this overview, we'll provide key insights into the Cybersecurity Maturity Model Certification (...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.