Security Programs That Thrive in Econom...
With economic conditions causing concerns, many security teams with limited resources are sacrificing security initiatives for cost containment. All while expanding attack surfaces are requiring more time and attention than ever before. If this problem sounds familiar, join us to learn how managed detection and response solutions, integrated with existing security investments, can more quickly establish an acceptable ROI while dramatically re...
Splunk JSP Workshop
Join us for session 1 of our Splunk JSP workshop where attendees will gain hands-on Splunk training to assist in future mission success.AgendaTimeTopic & Description9:00am - 9:15amKick-off: The Splunk team will kick-off what to expect over the day.9:00am - 12:00pmSplunk for Rookies: In this workshop, we will walk through a series of exercises designed to get someone new to Splunk to the point where they understand what Splunk is and what i...
2022 NSC Safety Congress & Expo
NSC Congress & Expo is a gathering of the nation’s leading safety, health, and environmental professionals. It is the world’s largest annual safety event. Why Attend – 2022 The Expo will offer more than 125 educational opportunities including Professional Development Seminars, Keynotes and Technical Sessions. Attendees will be able to choose from more than 25 seminars that provide hands on, in-depth career advancing oppor...
Internal Control & Fraud Prevention Tra...
Welcome to AGA's 2022 Internal Control & Fraud Prevention Training! The Internal Control & Fraud Prevention Training focuses on management’s responsibility for ensuring good systems of internal control, and the role of accountability professionals to minimize the risk of fraud, waste and abuse. Leaders in government and private industry discuss the latest discovery techniques, lessons learned and how governments are cooperating t...
Financial Agencies: Improve Anomaly Det...
The phrase "insider threat" often evokes not only headaches, but the mental image of a disgruntled coworker scheming on how best to bring an organization to a grinding halt. While this is absolutely an example of an insider threat, there is way more to an insider threat program than looking for web searches on "how to steal money from my employer like they did in Office Space and/or Superman 3."In this session, engineers from Splunk will revie...
Splunk Security for NPOs Virtual Worksh...
This hands-on virtual workshop is designed to familiarize participants with how to leverage Splunk to search security events. Splunk experts will provide users a way to gain familiarity with searching in Splunk, as well as introducing a set of commands that allow users to effectively examine their security events. We will leverage the popular Boss of the SOC (BOTS) dataset in a question-and-answer format. Join us for a virtual workshop where a...
2022 EXCEL Virtual Conference
The EXCEL Training Conference is sponsored by the U.S. Equal Employment Opportunity Commission's, EEOC Training Institute. Now in its 25th year, the EXCEL Training Conference is the premier national training conference for federal and private sector EEO managers, supervisors, practitioners, HR professionals, attorneys and Alternative Dispute Resolution (ADR) specialists. Private and public sector employees will gain invaluable knowledge for ma...
Solving STIGs and Automating Compliance...
Federal security professionals within the DoD must comply with the technical testing and hardening frameworks known as STIGs -- Security Technical Implementation Guides. STIGs contain technical guidance for "locking down" or "hardening" information systems and software that might be vulnerable to a malicious computer attack.While security is perhaps the single most important task federal IT professionals tackle, it's also the most complex. The...
Solving STIGs and Automating Compliance...
Federal security professionals within the DoD must comply with the technical testing and hardening frameworks known as STIGs - Security Technical Implementation Guides. STIGs contain technical guidance for "locking down" or "hardening" information systems/software that might be vulnerable to a malicious computer attack. While security is perhaps the single most important task federal IT professionals tackle, it is also the most complex. There...
Splunk US DoD Korea Cybersecurity and O...
Registration is Full Join us for a two-day Splunk cybersecurity and observability workshop series! Gain an understanding of solutions that are focused on investigating incidents, analysis for data-driven decisions, and holistic monitoring of IT environments. Attendees will have the opportunity to apply their learning in the fully integrated lab environment. The experience captures a day-in-the-life of cybersecurity and IT operations teams who...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.