Back to Search Begin New Search Save Search Auto-Notify
A New Era of Efficiency: Philadelphia's...
The right business applications can revolutionize government processes. Too many agency processes are still stuck in clunky, error-prone workflows of emailing various Word docs, Excel spreadsheets and PDF forms back and forth. For many government agencies, the idea of developing a custom solution can seem costly and daunting. But the city of Philadelphia has launched an innovative strategy for building and rolling out custom applications to he...
June 4, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
SANS 2024 Application Security & API Su...
Our applications and APIs are the gateways to our most sensitive and valuable data. As such, application and API security has become more and more essential to protecting our organizations. On this webcast, SANS certified instructor David Hazar will review the results of our 2024 AppSec/DevSecOps survey, and provide insight into: The best way to provide API security Investment trends in automated testing technologies Which tests are more impor...
June 5, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Modernization Best Practices: Learn fro...
Join the Center for Digital Government on June 5 at 11am PT/2pm ET for a uniquely practical perspective on IT modernization. We’re bringing together IT leaders from cities and counties to explain how they’re addressing technical debt, updating critical systems and launching new services. Our 2023 surveys gathered detailed information from more than 100 cities and counties on enterprise computing initiatives, network modernization,...
June 5, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Getting Identity Right Online: Insights...
Constituents want convenient, secure online government transactions via smartphones and laptops, but at the same time, bad actors are devising more clever schemes to impersonate real people and exploit online interactions. State governments stand in the middle as they attempt to provide frictionless digital services and make sure people are who they say they are. Join Government Technology and Socure for an in-depth exploration into the rapidl...
June 6, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Cloud Security Convergence: How Control...
As cloud security controls mature, it’s common to find that a wide variety of security controls and configuration capabilities are melding into a single platform or service fabric, in addition to the cloud provider infrastructure. Ranging from CNAPP to CSPM to CWPP and beyond, controls that cover the pipeline, workload security, cloud environment configuration, IaC templates, and runtime (and much more) are starting to evolve into a much...
June 14, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
June 17, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
2024 State of Security Automation Survey
Automation plays a vital role in improving capacity, efficiency, and performance in the SOC. Security teams spend far too much time “in the weeds,” unable to focus on solving the problems that matter. Security orchestration, automation, and response (SOAR) tools have the potential to streamline analysis, reduce response times, and improve quality. However, SOC teams often struggle to realize the full potential of this kind of autom...
June 25, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Practical Threat Modeling Based on Comm...
Every organization professes that risk management is at the heart of its cybersecurity program. Threat modeling is at the heart of this proactive approach: a systematic process that helps organizations identify, understand, and mitigate potential threats. However, with technology's ongoing advancement and the rising complexity of digital systems, constructing exhaustive threat models from the ground up can be daunting. In this presentation, Ja...
July 9, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS 2024 SOC Survey: Facing Top Challe...
In 2024, the SOC Survey continued to explore the detailed aspects of cybersecurity operations centers. The survey collected information on organizations’ capabilities, and what is outsourced. On this webcast, SANS Senior Instructor Chris Crowley examines survey results to understand how SOCs are architectured, favorite and frustrating technologies, staffing, funding, threat intel, and automation. Register for this webcast now, and you wi...
July 12, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Carahsoft Government Solutions Forum
Every organization professes that risk management is at the heart of its cybersecurity program. Threat modeling is at the heart of this proactive approach: a systematic process that helps organizations identify, understand, and mitigate potential threats. However, with technology's ongoing advancement and the rising complexity of digital systems, constructing exhaustive threat models from the ground up can be daunting. In this presentation, Ja...
July 25, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search