Back to Search Begin New Search Save Search Auto-Notify
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent. This poses a real threat to the continued operation of cybersecurity teams that require c...
Add Favorite
Improve Detection & Notification of Ran...
Do you have centralized visibility in your environment? Are you able to quickly detect and respond to advanced threats? Do you have the skill sets and resources to protect and remediate potential data breaches? Ransomware has hit government agencies hard across the country with an enormous increase in attacks from the previous year. Texas has not been immune to these threats either, as attackers continue to find new methods of exploiting vulne...
Add Favorite
Hacks, Threats & Ransoms - What's Next?...
Reduce the risk of security breaches by understanding and protecting what matters most: your critical data. Establishing metadata-driven intelligence and automation to operationalize data protection management helps you discover, classify, analyze, protect, and monitor sensitive data across your organization. Whether your sensitive data is structured, semi-structured or unstructured data in the cloud, on premises, in big data stores, or in rel...
Add Favorite
Tap into DHS Cyber Grants Funding to St...
The Biden Administration recently issued a statement warning of potential cyberattacks against U.S. organizations, as tensions rise between Russia and the rest of the world. Potential attacks to state and local critical infrastructure would disrupt the lives of millions of Americans, affecting lifeline services such as power, water, healthcare services, and supply chains. State, tribal and municipal government organizations need clear visibili...
Add Favorite
Driving Efficiency & Reliability for Mi...
In the fast-paced aerospace and defense software development landscape, continuous integration and continuous delivery (CI/CD) have become critical for ensuring high-quality, error-free software releases for military systems such as avionics, radar, communications, etc. However, achieving CI/CD can be a daunting task, especially when it comes to software testing. Manual testing can be time-consuming, prone to errors, and cannot keep pace with...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Creating A Capture Plan And Ask-Me-Anyt...
Creating A Capture Plan And Ask-Me-Anything, Government Contracting Open Lab REGISTER HEREhttps://www.govassociation.org/event-5428132 Classes are awesome, but Labs are even better. Come join us weekly as we train and prepare you to capture government contracts. These Lab sessions are designed to prepare CCM students with the hands-on support through your government contracting journey. Also, these labs sessions are open to all GCA members, pa...
Add Favorite
Transforming Government's Digital Prese...
In the realm of government, a seamless and impactful digital presence is no longer a luxury—it's a necessity. Attendees joined us discover the strategic alliance of Acquia and Amazon Web Services (AWS) emerging as a potent force that empowers federal, state, and local government agencies to elevate their online engagement and service delivery. During this on-demand session, we will delved into the intricacies of our partnership, explorin...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Security and Compliance in 2024: Trends...
A content management system (CMS) is a key piece of the foundation for building modern digital experiences that span farther than just your website today. Global brands such as Mars, Stanley, Black & Decker, NASA and many more have trusted Drupal as their CMS to power their brand differentiating experiences. However, with a rise in cyber attacks, the security of your digital platform is critical. Join us for an insightful conversation with...
Add Favorite
Back to Search Begin New Search