Back to Search Begin New Search Save Search Auto-Notify
DoDIIS 2022 Webinar Series: SecOps Auto...
VMware SaltStack SecOps is a VMware vRealize Automation add-on that delivers continuous compliance and vulnerability remediation with the power of SaltStack Config automation. With SaltStack SecOps, security and operations teams can work together to define a corporate IT security policy, scan systems against it, detect vulnerabilities and non-compliance issues, and actively remediate them - all from a single platform. Attendees of this webinar...
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Data Movement Across All Environments
Discover use cases in which Cloudera DataFlow (CDF) and Cloudera Data Platform (CDP)'s data in motion tools are being utilized by Department of Defense agencies to provide access to all observable data in real time and contextualize it with industry data for more informed decision-making with maximum efficiency and agility. Join us for a deep dive into Cloudera's data in motion features and how they leverage Apache NiFi to: Provide a m...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
Add Favorite
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team will touch on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts, you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. View the full agenda and register for all four sessions...
Add Favorite
CX Reimagined: How SMS Fosters Citizen...
Digitizing government services provides a unique opportunity to engage and serve the public. Prioritizing multi-channel outreach strategies has helped agencies to better engage with their vast audiences and underserved communities. Building an inclusive, transparent government starts with strategic communications that reach people where they are most. Governments benefit from creating thoughtful interactions that provide updates to enhance the...
Add Favorite
Lunch & Learn: A Day in the Life of A D...
Cloud modernization and migration strategies can be complex for federal government teams trying to go it alone. Investing in solutions that enable IT modernization helps agencies improve scalability, enhance security and streamline constituent services. Join GitLab and AWS next month in Austin, TX at a two-hour lunch and learn to hear: How GitLab and AWS have aligned with the most recent CISA guidance for defending Continuous Integration/Cont...
Add Favorite
Enabling Cloud Confidence
The biggest barrier to successful cloud adoption is often trust. Trust that a team won't cause a runaway cloud bill or run afoul of a compliance standard. Trust that an IT organization can deliver the support necessary to help a team get things done in the cloud. IT organizations in higher ED and state governments are similar when it comes to tackling cloud challenges: both have common roles and mandates around serving citizens and students co...
Add Favorite
Unlock the Potential of Healthy PDFs
PDFs have been the standard for file sharing since 1993. As standards continue to evolve, it’s important that those PDFs unlock efficiencies across the organization. However, not all PDFs are created consistently, and some may put you at risk of data exposure, exposure of business processes, and even fines resulting from noncompliant, inaccessible documents made available to a broad audience. Join our complimentary webinar to see how our...
Add Favorite
Back to Search Begin New Search