Back to Search Begin New Search Save Search Auto-Notify
Can a Cybersecurity Parametric Cost Mod...
Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurity activities, estimate an overall cybersecurity cost for a program, and obtain a defined and norm...
March 13, 2025
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Making the Case: How HR Leaders Can Sec...
HR leaders play a crucial role in shaping workplace culture, employee experience, and organizational success. However, securing executive buy-in for strategic HR investments—whether it’s technology, training, or talent initiatives—can be a challenge. There are proven approaches to help HR professionals build compelling business cases, align HR needs with agency and departmental goals, and effectively communicate ROI to key de...
March 13, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
SANS 2025 Threat Hunting Survey Webcast...
On this webcast, SANS Principal Instructor Josh Lemon will delve into results from the SANS 2025 Threat Hunting Survey. The 2025 survey will analyze how businesses enhance their threat detection capabilities amid an evolving threat landscape, characterized by increasingly sophisticated and rapid adversary tactics. On this webcast, you will learn about:The impact of generative AI on cybersecurityIntegrating advanced technologies into threat hun...
March 13, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
Navigating the DOGE Initiative: What It...
The newly established Department of Government Efficiency (DOGE) is making waves in federal procurement, but what does it really mean for government contractors? Join us for an in-depth panel discussion where industry experts will examine the potential impacts, challenges, and opportunities that DOGE presents. This session will go beyond the headlines to explore how this initiative could reshape procurement policies, introduce new technologica...
March 13, 2025
Organizer: Executive Mosaic
Location: Webcast
Add Favorite
Detroit Red Hat User Group
Red Hat® User Group (RHUG) events offer a unique opportunity for Red Hat technology users to gather and discover solutions to IT challenges with subject matter experts & peers. Join the next RHUG to network and explore cutting-edge solutions for IT modernization. Don’t miss this opportunity to transform your IT services while enjoying great food and building connections with industry professionals.We invite you to come join Red Hat a...
March 13, 2025
Organizer: Red Hat
Location: Royal Oak, MI
Add Favorite
Modern Virtualization Workshop
Red Hat and Portworx by Pure Storage can accelerate modern application adoption across enterprises. Join this workshop to see first hand how Red Hat® OpenShift® and Portworx enterprise-grade storage and data management capabilities work together as a foundation for modernizing applications – whether VMs or containers. Attendees will walk away understanding the key benefits that Red Hat and Portworx deliver including:Faster time to market...
March 13, 2025
Organizer: Red Hat
Location: Houston, TX
Add Favorite
CxOs, Build Workforce AI Literacy to En...
Realizing a full return on investment (ROI) from AI initiatives is a top priority for C-suite leaders, but hardest to achieve. While AI promises breakthrough benefits, none will be realized, nor can associated risks be mitigated, without upskilling the workforce. In fact, lack of training is a primary barrier to AI-enabled productivity. To jump-start realized and maximized value of AI investments, leaders should be proactively designing and ex...
March 13, 2025
Organizer: Gartner
Location: Webcast
Add Favorite
12 Emerging Technologies That Will Rede...
Gartner has identified 12 technologies poised to fundamentally transform how companies operate over the next five years and beyond. These technologies range from polyfunctional robots to automated cyber defense and earth intelligence, with advancements in AI and GenAI serving as force multipliers, often accelerating time to market. These trends are not confined to specific industries or verticals but will impact enterprises of all sizes and ac...
March 13, 2025
Organizer: Gartner
Location: Webcast
Add Favorite
Operationalizing OT Security: Protectin...
In today's operational technology (OT) environments, a mix of legacy, new, and industrial assets are increasingly interconnected, making them prime targets for external threats, including nation-state actors and well-financed adversaries. Protecting these environments necessitates comprehensive visibility across both IT and industrial. Join our webinar to discover how Dragos can enhance the visibility to your OT assets, enabling you to ide...
March 13, 2025
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Cyber Resilience with Forward Networks:...
Are you looking to stay ahead of:Latest cybersecurity threatsBest PracticesCutting-edge technologiesIf you answered yes to any of the above, join us for an exclusive 5-part webinar series covering key topics in cyber risk management, threat detection and advanced security strategies with the opportunity to earn 1 CPE credits per webinar! March 13 - Cyber Data Call Handling March 27 - Cyber Threat PrioritizationApril 10 - Zero Trust Network Val...
March 13, 2025
Organizer: Forward Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search