Back to Search Begin New Search Save Search Auto-Notify
Application Security Webcast
Building Security into Agile Development Methodologies The federal government and DoD are still facing challenges of incorporating security into rapid development and deployment methodologies. Agile software development methods focus on delivering working software continuously to customers typically in weeks, not months, to meet their ever changing requirements. As the speed of software development continues to increase year after year, how ca...
January 28, 2016
Organizer: HPE Software at Carahsoft
Location: Webcast
Add Favorite
Active Incident Response for Today's Ad...
It’s no secret that effective and timely incident response increases the chance of success in the face of sophisticated cyber attacks, when time is not on your side. This webcast will reveal how, with careful planning and the right resources in place, you can better detect and more quickly respond to a suspected security incident. Join this webcast and learn: The four key areas to focus on to be amply prepared for a major incident The d...
December 9, 2015
Organizer: The RSA Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Game Changer: Real-Time S...
How are agencies leveraging real-time analytics in a data-intensive government? The Internet of Things and explosions of big data are increasing the volume, variety, and velocity of information. This is driving the need for real-time data analytics in areas such as risk management, fraud detection, network monitoring, and intelligence and surveillance. Agencies have “right now” decisions where real-time insight can affect national...
May 21, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
April 22, 2015
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Ensuring Safe Access for Government Users
Verifying the identity and intentions of someone accessing confidential government information is never easy. Then add multiple mobile devices, ramp up the number of cyberthreats, and exponentially increase the amount of information available online -- now you're really facing a challenge. With these mounting obstacles, how do you keep your information secure? In this 1 hour online training you will learn how to: Secure information without imp...
November 13, 2014
Organizer: GovLoop
Location: Webcast
Add Favorite
Digital Spies: Encryption, Internet Tra...
According to Gartner, 50% of all network attacks will hide in internet traffic by 2017. This so-called SSL encrypted traffic is pervasive and while it can improve the security of data, it also bypasses most policy enforcement points. This creates a significant data security, privacy and compliance risk for government agencies. Indeed, hackers can evade 80% of agency network defenses by tunneling attacks in encrypted traffic. Our citizens and i...
November 12, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search