Back to Search Begin New Search Save Search Auto-Notify
Demo Desk: Device Patching & Intelligen...
Register for this event and learn how the integration between Forescout and Microsoft can work to overcome today’s challenges such as supporting organizations BYOD (bring your own device) scenarios for hybrid workforces while adhering to zero-trust security principles. Join this webinar to learn how with this integration, security managers can: Achieve a broader understanding of their security posture. Visualize key control metrics. Resp...
June 25, 2024
Organizer: Forescout Government Team at Carahsoft
Location: Webcast
Add Favorite
Accelerating Developer Productivity Wit...
Join Red Hat and Deloitte to discover how federal law enforcement agencies can reduce cognitive load, minimize friction and improve daily operations for development teams. Learn how to allocate more time to efficient feature delivery and collaborative work while maintaining adherence to security and compliance standards. The Red Hat Developer Hub is an enterprise-grade Internal Developer Portal (IDP) featuring customizable “Golden Path...
June 25, 2024
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Armored Vehicles Conference
Following the Russian invasion of Ukraine, which has demonstrated the continued tactical and operational importance of armored capabilities in the modern battlespace, along with growth and delivery of key armored vehicle programs, it is imperative that the US and allied nations continue to modernize their armored vehicle forces. Numerous US and allied armored vehicle programs are also reaching maturity, providing opportunities for the ongoing...
June 25-26, 2024
Organizer: IDGA
Location: Austin, TX
Add Favorite
TechNet Cyber
The harnessing of the right cyber power is more important than ever in a domain deluged by persistent attacks and simultaneous sophisticated campaigns that threaten global political, economic and security interests.A flagship event, AFCEA s TechNet Cyber serves as a center of gravity for a whole-of-government effort to bring together the policy, strategic architecture, operations and C2 along with the joint capabilities needed to meet the glob...
June 25-27, 2024
Organizer: AFCEA International
Location: Baltimore, MD
Add Favorite
On the Watch: Securing America's Supply...
From the energy grid to defense factories, America’s critical sites and services are a national priority. Keeping them up and running means staying ahead of the threat and protecting the supply chains that feed into them. What tools and advanced technologies are needed to defend and protect U.S. critical infrastructure? How is artificial intelligence factoring in, and where do leaders see new opportunities? How are defense and intelligen...
June 26, 2024
Organizer: POLITICO
Location: Washington, DC
Add Favorite
Responsible and Transparent Approach to...
The White House Executive Order for New Standards for AI Safety and Security and the Department of Homeland Security’s IT Strategic Plan includes the actions to ensure AI systems are safe, secure, and trustworthy, used responsibly, and address algorithmic discrimination. In this webinar, speakers will delve into the development and training of biometric matching algorithms and steps you can take to mitigate bias. The impact of bias inclu...
June 26, 2024
Organizer: IDGA
Location: Webcast
Add Favorite
Consolidation. Automation. Security. Ju...
Healthcare IT teams of all sizes and experience levels are tasked with enabling medical staff to provide the best possible patient care. However, efficiently supporting a wide variety of medical devices, often shared and mobile, spread across sprawling medical campuses is not easy. It's even more daunting when you consider the increase threat of cyberattacks seeking to steal lucrative patient health information (PHI) or mount a successful...
June 26, 2024
Organizer: NinjaOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Secure Your Multi-Cloud Environment fro...
Security teams today are dealing with endless lists of security issues, but lacking the necessary tools to effectively detect and mitigate the highest risks in their multi-cloud environment. In this session, we will unveil the latest security posture innovations in Microsoft Defender for Cloud, that empower security teams to identify security vulnerabilities spanning from code to cloud, to effectively prioritize the most business-critical risk...
June 26, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Advanced Network Defenses for Today’s F...
The modern enterprise, characterized by hybrid and mobile workforces supported by a hybrid cloud IT environment, brings many security challenges to the federal government, its agencies, entities, and sites. They face multi-faceted cybersecurity concerns due to the sensitive nature of their data, the critical infrastructure, and regulatory mandates involved. The distributed nature of operations, with numerous contractors and providers, introduc...
June 26, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search