Frameworks, Tools and Techniques: The J...
Just how effective or mature is your security program? Given the multitude of assessment, rating, and cybersecurity frameworks, it can be challenging to determine security operations readiness and resilience through a single measurement or framework. Is effectiveness based on defending against an attack or the ability to mitigate attacks in the first place? Should compliance drive our security strategy, or should our security strategy enable c...
Modernizing Business Systems: What Do Y...
Agencies are working hard right now to modernize business systems – including financial management, budgeting, HR, CRM and business analytics solutions. But it’s important to know what you’re getting into. What should you look for in a new business system solution? What are your biggest concerns? What questions should you be asking a potential provider? In this upcoming webinar, we’ll look at exclusive new data from a r...
How to Streamline Capital Project Management
Managing a capital project is no easy task. Owners of capital projects must ensure that budgets are allocated to the top priorities, that every dollar is spent effectively and that every project is delivered with quality. Given the exacting demands of this work, many leaders in the capital assets and infrastructure space are leveraging today's technology capabilities to improve their everyday processes — from calculating estimates and ru...
SANS Cyber Compliance Countdown
As we head into the last quarter of 2023, three major mandate changes are occurring, each positioned to make a large impact on how businesses, governmental bodies, and critical sector organizations operate. The goal of the SANS Cyber Compliance Countdown is to focus on what you need to know in these complicated and broad requirements and to offer solutions on how to meet these directives. Below is a quick overview of the changes and this forum...
Your Roadmap to SD-WAN and SASE
While state and local governments manage labor gaps and aging technology solutions, cyberthreats are growing more sophisticated. Transitioning to the next generation of networking and security solutions is necessary to future-proof operations and defend against attacks. It's a lot to manage alone. Which is why agencies should lean on a trusted partner to develop a clear roadmap that will modernize disjointed solutions and keep up with employee...
Democratizing Your Organization's Data...
Government agencies collect a myriad of data from their constituents, vendors, federal interfaces and more. However, most of this data sits unstructured, untouched and largely unusable – High on-prem storage costs and a lack of technical capacity often prohibit the development of meaningful data use. This means agency decisions are made in a silo without a holistic picture of the constituents served. So, how can agencies address data cha...
Cyber Solutions Fest 2023: Threat Hunti...
Going from responding to incidents to actively hunting threats is a stance shift that requires maturity in your cybersecurity journey. It also requires having access to the right threat intelligence, the right visibility across your environment, as well as the right tools to do the job. Advances in data science and artificial intelligence can help organizations bridge the maturity gap, but we shouldn’t forget that it’s ultimately a...
Principles of ESM Analysis
One of the most common shortcomings of Electronic Surveillance (ES) systems is the failure to accurately determine the Direction of Arrival (DOA) of radar signals. DOA errors typically lead to multiple tracks being created for each radar and to confusion on the Operator’s screen. Contributors to DOA error include equipment considerations, such as ESM antenna separation. These errors are quantifiable and solutions to mitigate such errors...
Setting the Stage for Successful Grants...
Successful grants management is becoming increasingly challenging without the right technology. Grants administrators are undoubtedly familiar with the frustrations, errors, and costs of managing grants through outdated methods. Even if your organization has shifted to a more technological approach, finding a system that fits your agency's unique needs can still be tough. So, how can your organization overcome these challenges to elevate its g...
AFFIRM/AGA CFO-CIO Webinar
Join AFFIRM and AGA virtually October 24, 2023 (9-11 a.m.) and listen to an insightful dialogue on the intersection of policies and management issues that impact Chief Financial Officers (CFOs) and Chief Information Officers (CIOs). Hear how they are working together to improve efficiency and transparency, reduce risk and strengthen their workforce.
October 24, 2023
Organizer:
AFFIRM Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.