Demo Desk: Device Patching & Intelligen...
Register for this event and learn how the integration between Forescout and Microsoft can work to overcome today’s challenges such as supporting organizations BYOD (bring your own device) scenarios for hybrid workforces while adhering to zero-trust security principles. Join this webinar to learn how with this integration, security managers can: Achieve a broader understanding of their security posture. Visualize key control metrics. Resp...
Accelerating Developer Productivity Wit...
Join Red Hat and Deloitte to discover how federal law enforcement agencies can reduce cognitive load, minimize friction and improve daily operations for development teams. Learn how to allocate more time to efficient feature delivery and collaborative work while maintaining adherence to security and compliance standards. The Red Hat Developer Hub is an enterprise-grade Internal Developer Portal (IDP) featuring customizable “Golden Path...
Armored Vehicles Conference
Following the Russian invasion of Ukraine, which has demonstrated the continued tactical and operational importance of armored capabilities in the modern battlespace, along with growth and delivery of key armored vehicle programs, it is imperative that the US and allied nations continue to modernize their armored vehicle forces. Numerous US and allied armored vehicle programs are also reaching maturity, providing opportunities for the ongoing...
June 25-26, 2024
Organizer:
IDGA Location:
Austin, TX
TechNet Cyber
The harnessing of the right cyber power is more important than ever in a domain deluged by persistent attacks and simultaneous sophisticated campaigns that threaten global political, economic and security interests.A flagship event, AFCEA s TechNet Cyber serves as a center of gravity for a whole-of-government effort to bring together the policy, strategic architecture, operations and C2 along with the joint capabilities needed to meet the glob...
On the Watch: Securing America's Supply...
From the energy grid to defense factories, America’s critical sites and services are a national priority. Keeping them up and running means staying ahead of the threat and protecting the supply chains that feed into them. What tools and advanced technologies are needed to defend and protect U.S. critical infrastructure? How is artificial intelligence factoring in, and where do leaders see new opportunities? How are defense and intelligen...
June 26, 2024
Organizer:
POLITICO Location:
Washington, DC
Responsible and Transparent Approach to...
The White House Executive Order for New Standards for AI Safety and Security and the Department of Homeland Security’s IT Strategic Plan includes the actions to ensure AI systems are safe, secure, and trustworthy, used responsibly, and address algorithmic discrimination. In this webinar, speakers will delve into the development and training of biometric matching algorithms and steps you can take to mitigate bias. The impact of bias inclu...
June 26, 2024
Organizer:
IDGA Location:
Webcast
Consolidation. Automation. Security. Ju...
Healthcare IT teams of all sizes and experience levels are tasked with enabling medical staff to provide the best possible patient care. However, efficiently supporting a wide variety of medical devices, often shared and mobile, spread across sprawling medical campuses is not easy. It's even more daunting when you consider the increase threat of cyberattacks seeking to steal lucrative patient health information (PHI) or mount a successful...
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer:
FedInsider Location:
Webcast
Secure Your Multi-Cloud Environment fro...
Security teams today are dealing with endless lists of security issues, but lacking the necessary tools to effectively detect and mitigate the highest risks in their multi-cloud environment. In this session, we will unveil the latest security posture innovations in Microsoft Defender for Cloud, that empower security teams to identify security vulnerabilities spanning from code to cloud, to effectively prioritize the most business-critical risk...
Advanced Network Defenses for Today’s F...
The modern enterprise, characterized by hybrid and mobile workforces supported by a hybrid cloud IT environment, brings many security challenges to the federal government, its agencies, entities, and sites. They face multi-faceted cybersecurity concerns due to the sensitive nature of their data, the critical infrastructure, and regulatory mandates involved. The distributed nature of operations, with numerous contractors and providers, introduc...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.