FY24 Virtual Acquiring Excess Training
Greetings Personal Property Officials; GSA Personal Property Management is hosting a series of virtual training sessions on various aspects of the program. The topic of this FREE virtual training will be Acquiring Excess Personal Property directly from Federal Management Regulation (FMR) 102.36. This training will provide you with information as to who can acquire excess personal property, whether we pay for it or not, how to acquire the prope...
Strengthening ICAM Solutions with AAL3...
Join us as Yubico and Axiad join forces to explore a comprehensive approach encompassing user-centric authentication, secure credential issuance, and lifecycle management utilizing security keys. In this session, hear from Axiad’s Chief Innovation Officer, Bassam Al-Khalidi and Yubico’s Senior Solutions Engineer, David Papp on how to: Strengthen your Zero Trust identity posture Increase IT productivity and reduce downtime Unify and...
Venafi Customer Forum
Please join Venafi & Carahsoft as we host this two-day event to learn from one another about today’s machine identity management challenges and solutions. The key takeaways you will gain from this event: Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management. Future-Proof Your Cybersecurity...
Simplify Data Governance at Scale Acros...
Many government organizations employ numerous data platforms across their organization for analytical workloads, including data lakes, data marts and data warehouses. As data volumes grow – and more users across your organization want access to data to accelerate business decision-making – managing data governance is more important than ever. Join us to learn how to simplify data governance for analytics and deliver data governance...
Ensuring Reliability: A Guide to Testin...
We understand that critical errors and broken dashboards can occur at any time, posing significant risks to your business operations, especially during migration or upgrade processes. Our expert-led session will provide you with practical strategies and techniques to mitigate these risks effectively. Join us as we delve into the crucial aspects of testing, certifying and building trust in your Tableau dashboards. During this webinar, attendee...
CTO Sessions: Quantum-Resistant Code Signing
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a requirement to support them by 2025. SP 800-208 requires that all stateful HBS key generation and signature algorithms b...
UEM Innovation Update: How BlackBerry H...
Join BlackBerry and Carahsoft for a live webinar providing a fresh look at protecting federal networks and data with UEM updates and key differentiators. In this webinar, attendees will learn about BlackBerry’s upgrades to the UEM platform, including: Enhanced Security for Multiple Deployment Models (COPE, BYOD, etc.) Increased Productivity / UX for Daily Tasks with Microsoft Intune Integration Real-Time Mobile Threat Defense for All Sec...
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer:
FedInsider Location:
Webcast
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
Exploring Five Emerging Cybersecurity D...
In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM) Cloud-native application protection platform (CNAPP) Cloud infr...
May 1, 2024
Organizer:
ISC2 Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.