Exploited Vulnerabilities, the Threat A...
In this webinar, Patrick Garrity, Security Researcher at VulnCheck, will dive into exploited vulnerabilities, exploring which technologies are impacted, which threat actors are most active, and how quickly vulnerabilities are being exploited once disclosed. Understanding these dynamics is key to staying ahead of emerging threats and protecting your mission. Join VulnCheck on December 4th to discover:The most commonly exploited vulnerabilities...
Bringing Digital Transformation to Gove...
All levels of government—from federal agencies all the way down to cities, towns, and territories—are facing an ongoing struggle to replenish the ranks of their employees as they retire or move on to other jobs, either within government or the private sector. Agencies face increasing pressure to hire, train and retain employees just to keep pace with the growing number of retirements. Compounding the issue is the complexity of the...
December 4, 2024
Organizer:
FedInsider Location:
Webcast
Eliminate Network Blind Spots and Build...
The Forescout and Gigamon integration offers a flexible solution that centralizes network intelligence from multiple sources, empowering your Network and Security Operations Center. This minimizes blind spots, strengthens security hygiene and helps you better manage cyber risks. Join Ron and Nikhil for our discussion to learn how Forescout & Gigamon can: Identify All Devices: Learn how Forescout automatically identifies and tracks connecte...
Revolutionizing HR and Payroll: Strateg...
Join us for a discussion where guests will explore strategies to enhance payroll systems and leverage data for better decision-making. Our panel of experts will also discuss how emerging technologies like AI and automation are reshaping payroll services and how agencies are ensuring user satisfaction and mitigating risks. Key topics include:Addressing challenges in payroll services, including technology, data, and workforce needsLeveraging dat...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then move...
OASIS+ Delegation of Procurement Author...
OASIS+ Delegation of Procurement Authority (DPA) Training gives procurement staff access to the new OASIS+ contracts and teaches best practices for task order issuance. The DPA clearly delineates the roles and responsibilities between the GSA contracting officer and the ordering contracting officer and complies with the Office of Management and Budget's executive agent designation to GSA. Warranted OCOs (a contracting officer appointed pursuan...
Using Enterprise Automation to Meet the...
Logistics, maintenance, and sustainment within the Military Departments face significant challenges, particularly in the Joint Logistics Enterprise (JLEnt), where combatant commands, Defense agencies, contractors, and allies must coordinate in contested environments. Despite efforts to address interoperability, the absence of a unified, enterprise-level data ontology continues to hinder dynamic logistics planning and real-time decision-making....
Enhancing GIS Operations for Airports
As airports navigate complex operations, GIS technology becomes essential for integrating data from multiple systems, providing a comprehensive view of operations. This event will showcase insights from industry experts and explore the critical role of GIS in airport operations followed by a collaborative discussion. Join Samsara, Esri, and Carahsoft for an engaging virtual roundtable focused on GIS operations in the aviation sector. This even...
Health IT Workshop
In the wake of a once-in-a-generation pandemic, the nation’s public health system has never been so important and under such considerable spotlight. Holes in the existing public health infrastructure — at the federal, state and local levels — require both innovative technologies and dedicated leadership to address. For hospitals and health care providers to provide better patient care, they need IT innovations that promote an...
December 3, 2024
Organizer:
GovExec Location:
Virtual
Strengthening Cybersecurity in the Judiciary
As the digital transformation of the judiciary accelerates, courts are increasingly reliant on technology to administer justice efficiently and securely. However, this reliance brings heightened cybersecurity risks, necessitating robust defense mechanisms to protect sensitive data and maintain the integrity of judicial processes. Join experts from Zscaler and CrowdStrike in a comprehensive webinar designed specifically for courts and judicial...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.