Back to Search Begin New Search Save Search Auto-Notify
AI & Data Exchange 2024
Federal work on AI, machine learning and data-intensive pilots and projects is not new. But the White House’s October 2023 executive order on secure development of AI — coupled with congressional bills aimed at ensuring security and privacy remain chief focuses — has created a new set of priorities for agencies going forward. During Federal News Network’s inaugural AI & Data Exchange, presented by Guidehouse, govern...
February 27-28, 2024
Organizer: Federal News Network
Location: Virtual
Add Favorite
ATARC Zero Trust Phase 2 Demonstration...
Discover how iboss Zero Trust SSE and Resiliant’s ID Verification technologies collectively address the 13 ATARC Phase 2 scenarios. These solutions embody the principles of the NIST 800-207 Zero Trust Architecture, offering a multifaceted approach to cybersecurity. iboss Zero Trust SSE: By replacing legacy VPN with ZTNA, legacy proxy appliances with Security Service Edge, and legacy VDI with Browser Isolation, the iboss Zero Trust SSE en...
February 16, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Army Threat Intelligence in the Crosshairs
As worldwide cyber threats intensify, every soldier, sailor, marine, airman, guardian, reservist, DoD civilian, and contractor has a special responsibility to actively manage the risk of the Department. However, in this dynamic environment where cyber threats are becoming increasingly sophisticated, this is especially difficult. As a result, the importance of adapting to change cannot be overstated. Attend this four-part Army webinar series t...
February 15, 2024
Organizer: Google Cloud Government Team at Carahsoft
Location: Webcast
Add Favorite
On the Brink: Microsoft Security Immers...
Your data is crucial to your organization’s success and keeping that data secure is a top priority. Ensuring the protection of your company from insider risks or data loss requires quick discovery and reaction to security concerns. Your team must be ready to recognize and respond to any threat.Join this immersive simulation event, where you will engage in a level-400, real-world technical security breach. You’ll follow the actions...
February 13, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Infosec CompTIA CySA+ Training Boot Camp
The CompTIA CySA+ Training Boot Camp prepares you to pass the CySA+ certification exam by covering the following domains: Threat and vulnerability management: Perform vulnerability management activities and analyze output from vulnerability assessment tools. Software and systems security: Apply security solutions for infrastructure management and implement software and hardware assurance best practices. Security operations and monitoring: Anal...
January 29 - February 2, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Unboxing Identity: Customer Identity Demo
Chances are your org doesn’t specialize in auth, so why should your developers? Learn how to build auth (with or without code) using Okta’s Customer Identity Cloud. See how features like adaptive MFA, step-up auth and integrated social logins help balance privacy with conversion and convenience with security. In this 30-minute demo, we will cover: Setting up auth & login experience Custom login flows Attack protections Register...
January 31, 2024
Organizer: Okta
Location: Webcast
Add Favorite
Making AI Work for Us - Improving Acqui...
DESCRIPTION: Generative Artificial Intelligence and Emerging Technologies have entered the government procurement environment and from everyone’s perspective these technologies are here to stay. These newer technologies enable us to re-imagine service delivery and provide more efficient operations; however, there are still concerns about ethical and legal implications, intellectual property rights, data and privacy protection, and more....
January 31, 2024
Organizer: ACT-IAC
Location: Reston, VA
Add Favorite
Keeping Students Safe Online: How to Ma...
K-12 schools are lucrative targets for cyberattacks because they house vast amounts of valuable student data. For these schools to implement a comprehensive cybersecurity strategy – one that enables leading-edge detection and response – their leaders must generate maximum value out of their cybersecurity investments. That means deploying tools and services with a dual purpose or multiple advantages, emphasizing stretching cybersecu...
January 31, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Microsoft 365 Virtual Training Day: Fun...
Reimagine the way you work at Microsoft 365 Virtual Training Day: Fundamentals. Join us at this free event from Microsoft Learn to see how to work smarter and faster with Microsoft 365 while maintaining built-in security and compliance. You’ll also explore licensing, service, and support options for your organization. Who should attend: IT professionals and administrators IT decision makers Technical level: This is a foundational-level c...
January 30-31, 2024
Organizer: Microsoft
Location: Virtual
Add Favorite
Army Threat Intelligence in the Crosshairs
As worldwide cyber threats intensify, every soldier, sailor, marine, airman, guardian, reservist, DoD civilian, and contractor has a special responsibility to actively manage the risk of the Department. However, in this dynamic environment where cyber threats are becoming increasingly sophisticated, this is especially difficult. As a result, the importance of adapting to change cannot be overstated. Attend this four-part Army webinar series t...
January 30, 2024
Organizer: Google Cloud Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search