AFCEA TechNet Mid-America Conference
The AFCEA International Scott-St. Louis Chapter is excited to announce the 2024 AFCEA TechNet Mid-America Conference is an in-person event! This two-day program, taking place June 5-6, 2024, will feature training opportunities, a career fair, and an immersive exhibit hall chock full of information about the latest Information Technology (IT) tools, trends, and innovations. In addition, attendees can take advantage of a variety of opportunities...
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. Reserve a spot and earn up to 3 Continuing Professional Education (CPE) credits by taking th...
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
Protecting Sensitive SAP Data with Dyna...
The current regulatory compliance and cyber threat landscape is constantly shifting and coupled with digital transformation projects like S/4HANA migrations, protecting sensitive data within SAP systems is paramount. To secure sensitive SAP data effectively, organizations must implement data-centric security controls such as Dynamic Data Masking. Unfortunately, many organizations have a security gap when it comes to the data-layer of their SA...
APHSA National Human Services Summit
The American Public Human Services Association (APHSA) National Human Services Summit offers unparalleled access to learning, peer networking, and connecting with a wide array of committed partners and organizations all working toward: Moving Human Services Upstream Advancing Social and Economic Mobility Strengthening the Human Services Sector APHSA strives to create an experience for Summit attendees that fosters knowledge-building on...
GitLab Training: Security Essentials fo...
Have you considered becoming a GitLab Certified Professional? GitLab is coming to Reston, VA on Monday, June 10, for a hands-on training covering all of the essential security capabilities of GitLab and tailored to the Federal Systems Integrator community. This course will offer live instruction on critical security techniques, including Static Application Security Testing, secret detection, Dynamic Application Security Testing, dependency sc...
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, aims to delve into the nuances of GAI, particularly focusing on its utilization by...
Maximize Security Detection with CrowdS...
You’re invited to a CrowdStrike | Mimecast Higher Education webinar on June 11th. During this webinar, Omar Cordova, Senior Sales Engineer at Mimecast, and Josh Radlein, Solutions Architect at CrowdStrike will discuss how you can help secure your customer’s environments from sophisticated, targeted threats. In the current cybersecurity climate, organizations need to protect themselves from the increasing volume and impact of ransom...
Cohesity Cyber Incident Workshop
Joining Cohesity for an exclusive half-day workshop, participants will be guided through a comprehensive cyber event simulation. Throughout the workshop, they will triage, diagnose, and respond to simulated cyber threats, reflecting on the incident response process and exchanging perspectives and best practices with experts and fellow participants in Operation Stormfall. It's not just about preparedness; it's about empowerment, as atte...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.