Nation-State Threat Landscape Overview: China
Join CrowdStrike for a Join CrowdStrike for a deep dive into the nation-state threat landscape of China. Joshua Shapiro, CrowdStrike’s public sector threat intel SME, will give a brief on the broader geopolitical context for the latest Chinese cyber activities, an overview of the primary threat actors responsible for Chinese offensive cyber operations, and these actors’ TTPs (tactics, techniques, and procedures). He will also share...
An AppSec Awareness Program for Develop...
Today, agencies are striving to improve their application security programs, while at the same time, not slowing down the development, delivery, and deployment of their software applications. Can a balance be achieved between security and an organization’s (or agency’s) daily business requirements? We know it’s possible. Application Security (AppSec) Awareness Programs that are specifically focused on the development communit...
A Better Approach for Agencies to DevSecOps
The recent shift towards DevOps makes it clear that Federal agencies are moving forward with adopting this operational model to facilitate the practice of automating development, delivery, and deployment of mission-critical software. While the traditional idea of a software release dissolves into a continuous cycle of service and delivery improvements, agencies find that their conventional approaches to software security are having a difficult...
Tech Talk Tuesdays | Arbor Edge Defense...
One of the biggest threats to maintaining Continuity of Operations is a DDoS attack. Tom will discuss: (1) the evolution of modern DDoS attacks; (2) technical vulnerabilities of on-premise devices such as VPN gateways, firewalls and application servers to DDoS attacks; and (3) demonstrate the technical features of Arbor Edge Defense that enable it to be the first and last line of an automated perimeter defense
Tech Talk Tuesdays | Enhancing Visibili...
The flexibility and ease of deployment of SD-WAN has accelerated its deployment as new network edges emerge for large enterprise and government entities as MPLS continues to be prevalent within the Federal ecosystem. Tory will discuss: (1) Remote site monitoring solutions for MPLS; (2) Utilizing vSTREAM Family of Virtual Appliances for maintaining visibility in SD-WAN environments; (3) Deployment options for vSTREAM within uCPE of SD-WAN or Pu...
Tech Talk Tuesdays | Cloud Migration
Cloud migration is a complex endeavor for even the most experienced of IT professionals. Patrick will discuss: (1) The AWS “Well Architected Framework” whitepaper; (2) How Smart Data and NETSCOUT Threat Intelligence Solutions can help improve operational efficiency, lower costs, improve performance, and build Security into any Cloud environment; and (3) technical best practices for monitoring cloud migrations and cloud implementations.
Threat Intel Virtual Workshop with Crow...
Federal agencies are working tirelessly to keep our nation and its most precious assets safe from an unrelenting and increasingly complex stream of cyberattacks. As our adversaries are getting more sophisticated with their approach and methods, public and private sector organizations alike are fighting hard each and every day to stay one step ahead of attacks. Join experts from CrowdStrike and GuidePoint Security for an informative threat inte...
Tech Talk Tuesdays | Monitoring VDI Env...
The Virtual Desktop Infrastructure continues to evolve its mission critical application status as organizations of all types realize the importance of enhanced user mobility and remote access. Paul will discuss: (1) Common challenges of access; poor user experience; and application issues; (2) How to use network visibility to understand and manage your VDI environment; and (3) Best Practices for Instrumentation.
An AppSec Awareness Program for Develop...
Today, agencies are striving to improve their application security programs, while at the same time, not slowing down the development, delivery, and deployment of their software applications. Can a balance be achieved between security and an organization’s (or agency’s) daily business requirements? We know it’s possible. Application Security (AppSec) Awareness Programs that are specifically focused on the development communit...
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.