Connect Data and Apply other Azure Serv...
Part four of the four-part training series Deploy and scale enterprise web apps with Azure Once you have your app running in Azure, you can start doing much more with it. We’ll show how to take advantage of fully managed, highly available MySQL. So that you can control access to tokens, passwords, certificates, API keys, and other secrets, we’ll introduce you to Azure Key Vault. Key Vault also makes it easy to create and control th...
December 16, 2020
Organizer:
Microsoft Location:
Webcast
Securing DevOps with Containers, Encryp...
When bad actors attack, data encryption is the first and the last line of defense. Container image scanning, container runtime stack protection, and perimeter protection are important, but data security should start with protecting the data itself. Join industry experts from Red Hat, Fornetix and Zettaset on December 10th for a technical dive into their integrated solutions that offer enterprise level encryption on a leading hybrid cloud, ente...
Simplify Desktops with One Solution Acr...
Prior to the COVID-19 pandemic, remote work for individual government employees depended mainly on data sensitivity. The more sensitive the data, the less likely remote work would be an option. Liquidware provides desktop virtualization solutions that help government organizations meet US-CERT recommendations. These solutions are platform-agnostic and together with Teradici Cloud Access software offer the highest grade of encryption and securi...
Utilizing CDM to Help Improve Your Cybe...
Security Back to Basics – Why Deploying an Encryption Key Manager Is Critical The Continuous Diagnostics and Mitigation (CDM) Program delivers automated tools to federal departments and agencies to strengthen their ability to monitor and manage cyber vulnerabilities and the ever-changing threats to their enterprise. Consistent with the Federal Government's deployment of Information Security Continuous Monitoring (ISCM), the CDM Program i...
November 5, 2020
Organizer:
Fornetix Location:
Webcast
Transforming Federal Cloud Delivery wit...
Public Sector IT decision-makers are facing unprecedented pressure to adapt the way their technology services are delivered and consumed. Federal organizations require mission-critical cloud platforms and services that deliver a high level of performance while also being architected to stringent security and compliance standards, such as FedRAMP, FISMA and ITAR. Join Pritesh Parekh, Chief Trust Officer, Virtustream, to discuss the importance...
Federal CTO Tech Talk: Network Security...
Our customers often want to know if our networking solutions are “secure.” What does it mean to be secure, and how do we achieve it? The pillars of network security include encryption (protecting confidentiality), authentication (ensuring the right people have access), and integrity (ensuring data hasn’t been tampered with). Join Dan Harkins and Jon Green to learn about these topics that are sure to make you a hit at your nex...
The Blind Spot in Object Storage
Amazon S3 is one of the most successful services provided by AWS. AWS has unlimited emphasis, ensuring your data is safe. Customers and AWS leverage many native features and security frameworks, including redundancy, bucket permissions, encryption and duplication across regions and availability zones. However, the hidden threat to your customers and corporate applications dependent on Amazon S3 is the ability for intentional malware to be upl...
Northwest Virtual Roundtable: Maximizin...
Google Cloud, Tableau, and Carahsoft invite you to a lunch-and-learn to discuss their joint approach to helping government agencies make the most out of their data. With the shift to digital services during COVID-19, agencies have more data on their services, citizen interactions, and third party data sources than ever before. The challenge isn't access or the data itself, it's how to logically make sense of all of it in order to present the d...
FCW Summit: What's Next for FedRAMP?
First floated as an idea in 2010, the Federal Risk and Authorization Management Program was officially launched in 2012 as a government-wide program to secure cloud products and services. A recent audit by the General Accountability Office showed that more than 900 government cloud projects have been authorized by FedRAMP, but hundreds more continue to operate without authorizations, which presents a kaleidoscope of security challenges to the...
Cybersecurity Technical Excellence Webi...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.