The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team will touch on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts, you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. View the full agenda and register for all four sessions...
CCSK | CCSP Training Week
Created by (ISC)2 and the Cloud Security Alliance, Brought Together for You by Intrinsec. The CCSK X CCSP Training Week is an exclusive five (5) day program designed specifically to provide the most comprehensive preparation, and discussion successfully completes the CCSK and CCSP certification exams. The CCSK (Certificate of Cloud Security Knowledge ) gives a broad overview of cloud security and allows learners to gain critical insights into...
Rocky Mountain Information Security Con...
The Rocky Mountain International Symposium on Computers (RMISC) is the only conference of its kind in the Rocky Mountain region. A convenient and cost-effective knowledge-building tool for IT security, audit, and compliance professionals of all levels. RMISC offers the ideal combination of education, networking, and opportunities for success in today’s economy and security climate! Typically, the conference lasts three full days of learning.
June 7-9, 2023
Organizer:
ISACA Location:
Denver, CO
SecureWorld Chicago
SecureWorld events and programming foster Growth, Access, and Excellence among cybersecurity professionals. SecureWorld is… the stepping stone to grow in your abilities and career path SecureWorld is… access to the knowledge and solutions you need, in the place you live SecureWorld is… a unique experience with excellence in both speakers and content For more than 21 years, SecureWorld has been tackling global cybersecurity...
Hybrid Technology Briefing for the Publ...
Carahsoft and Invicti invites you to join us for a Technology Briefing for the Public Sector hosted by Invicti Security. You will begin with a networking breakfast and spend a half day with Invicti learning about how to best protect your web applications and APIs with dynamic application security (DAST). Attendees can join in person or online and receive CPE credits for participating in this half-day event. This will be an interactive session...
SecureWorld Eastern Virtual Conference
SecureWorld events and programming foster Growth, Access, and Excellence among cybersecurity professionals. SecureWorld is… the stepping stone to grow in your abilities and career path SecureWorld is… access to the knowledge and solutions you need, in the place you live SecureWorld is… a unique experience with excellence in both speakers and content For more than 21 years, SecureWorld has been tackling global cybersecurity...
Defense One Tech Summit
In its 8th year, the annual Defense One Tech Summit will explore how today's emerging technologies are shaping the military tactics and national-security strategies of tomorrow. After completing this course, you will be able to: Explore emerging technologies and understand their likely impact on the national security tactics and strategies of tomorrow.
Modern Data Protection Strategies to Pr...
Join us to discover backup strategies and features of the industry-leading backup, recovery and data security solution for all workloads, both on-premises and in the cloud. Gain insights from Veeam’s long history of protecting sensitive US Courts critical data. Learn the limitations of legacy systems and how to: Deliver trusted availability for all cloud, virtual, kubernetes and physical workloads Achieve fast, flexible, reliable backup,...
Veracode and RestOnLogic Lunch & Learn
Join us at the Carahsoft Cafe for Veracode and RestOnLogic's Lunch & Learn! We'll be putting development and application security together. Building off of the Webinar Series - The Fundamentals of Application Security in Government, we are offering a technical lunch and learn to see these building blocks of AppSec come together to support the application development pipeline. Join us for a live demonstration showcasing an end-to-end AppDev...
F5 Security for AWS Native Services
As the federal government continues to migrate workloads and applications to the cloud, securing these environments remains a fundamental focus. F5 and AWS share a mission to provide industry leading enterprise services to meet agencies where they are on their cloud journeys and remove security barriers so they can achieve their cloud vision. F5’s best-in-class security and traffic management solutions complement AWS cloud services and e...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.