Back to Search Begin New Search Save Search Auto-Notify
Vulnerability Management: Leveraging Context
So you have a vulnerability management program. Great. Excellent. But are you able to let the management team know if it is being effective or not? In this final Vulnerability Management series webcast, join Jonathan (MGT516 co-author and SANS certified Instructor) as he discusses how to show your program is being effective through metrics and measures. He will discuss metrics that a new program can start creating and generating on day 1 as we...
September 14, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
3rd Annual Digital Forensics for Nation...
DSI’s 3rd Annual Digital Forensics for National Security Symposium will once again bring together members of the Federal Government, DoD, US Military Services, Industry, & Academia in a ‘town-hall’ style forum to examine how advances in Digital Forensics, sometimes called ‘Computer Forensics’, are advancing investigative capabilities when examining electronic crimes, attacks, and intrusions at the national, st...
July 27-28, 2022
Organizer: Defense Strategies Institute
Location: Oxon Hill, MD
Add Favorite
The Internet Storm Center: How to Use a...
For about 20 years, the Internet Storm Center has offered terabytes of data to the community to help you understand attacks you are seeing and assist you in augmenting your logs or, as we often put it, "add color" to your network logs. In this keynote, we will introduce some of our volunteer handlers who contribute their insight in daily diaries (you will also learn why we call it a "dairy" and not a "blog"). In addition, we will walk you thro...
July 12, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
How To Secure Critical Workloads and Di...
Like many agencies, the North Carolina Department of Health and Human Services (NCDHHS) had to rapidly deploy mission-critical services during the pandemic to meet constituent needs. But while speed was paramount, it could not come at the expense of security. Protecting residents’ sensitive information and complying with federal and state security mandates are a top priority for the department. Join Government Technology on June 28 at 10...
June 28, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Fully Utilize Data to Give IIJA Funding...
The Infrastructure Investment and Jobs Act (IIJA) allocates billions of dollars for state and local governments as they strive to close the digital divide.Though each state is promised at least $100 million, additional money will be distributed based on a complicated series of calculations and other information that applicants submit. Including all possible helpful data can give agencies a boost as they seek to unlock IIJA funding.During a li...
June 24, 2022
Organizer: Governing
Location: Webcast
Add Favorite
Better Case Management, Better Communit...
Social services agencies represent some of the most important work government does: Building stronger communities by connecting children, families and individuals with the programs and services they need. But too often, these agencies struggle with difficult, time-consuming processes for managing community information. Outdated technologies and legacy processes that still rely on spreadsheets make it harder for social services agencies to fulf...
June 17, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
The 2022 Digital Cities Survey is Live!
It’s that time again to work with cities across the country to share the innovative work you all do! The Center for Digital Government’s Digital Cities Survey provides the opportunity for city information technology organizations to highlight the great work being done, benchmark with their peers and identify future trends. This year’s survey will reflect current challenges and the changing technology landscape as everyone str...
June 17, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Identity & Cybersecurity: Building an I...
Identity and access management (IAM) is a vital focus for any modern cybersecurity strategy. But verifying and protecting identity isn’t as simple as buying a new security tool, or even a suite of new cyber solutions. True identity and access management isn’t a product. It’s a process – one that requires an extensive an ecosystem of collaborative agencies and interlinked providers. Building a truly interoperable IAM str...
June 16, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Gartner CFO & Finance Executive Conference
CFOs are driving the business to meet the rapidly evolving needs of customers, investors, employees, competitors and the Board, while also navigating rising inflation, supply chain constraints, a tight labor market, ESG demands, regulatory uncertainty and the continued reopening. The rising needs of stakeholders and macro pressures act as a catalyst for CFOs to “digitally elevate” and deliver more real-time, predictive, errorless,...
June 6-7, 2022
Organizer: Gartner
Location: National Harbor, MD
Add Favorite
How to Build a Digital Center of Excellence
State and local government organizations continue to seek ways to streamline workflows and further improve process efficiency. One important way to achieve this is by establishing a shared services model whereby specific technology is leveraged across multiple departments and agencies. In records management, this enterprise-wide approach starts with document management and electronic signatures. On June 1 at 10 a.m. Pacific/1 p.m. Eastern, joi...
June 1, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search