Conquer Any Cybersecurity Challenge: Th...
The public sector faces unique challenges around enhancing security and streamlining operations – and it can be difficult to address these issues due to resource constraints, increasingly complex environments, a rise in cyberattacks and data overload. Luckily, emerging technologies are helping to change this. Explore the tools that can help organizations improve attack surface visibility, automate repetitive manual tasks and provide anal...
Venafi Customer Forum
Please join Venafi & Carahsoft as we host this two-day event to learn from one another about today’s machine identity management challenges and solutions. The key takeaways you will gain from this event: Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management. Future-Proof Your Cybersecurity...
Measuring ROI: Strategies for Governmen...
Tips for Advocating and Optimizing Mission IT Assets Every agency expects a return on their investment in federal IT – especially finance managers and program executives who must make choices between spending on IT versus other program priorities. But few agencies know how to measure ROI. At this event, IT acquisition and management experts will discuss how to measure ROI, how to estimate future ROI, and when/where ROI is important to fe...
April 24, 2024
Organizer:
REI Systems Location:
Webcast
Sea-Air-Space 2024 Webinar Series: Fort...
Ivanti and Carahsoft are excited to invite you to our Sea-Air-Space 2024 webinar to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Insufficient prioritization that misrepresents vulnerability risk, time-consuming, error-prone manual processes, friction between IT and security teams that can delay or outright block, and remediation efforts. These are all the hallma...
ISACA CISA Training Boot Camp
Infosec’s CISA Boot Camp extensively prepares you for the ISACA CISA exam, which consists of 150 multiple-choice questions that cover the five information systems auditing areas. These areas have been created from a CISA job practice analysis and reflect the work performed by information systems auditors: Information systems auditing process Governance and management of IT Information systems acquisition, development and implementation I...
April 29 - May 3, 2024
Organizer:
Infosec Location:
Virtual
TX Practitioners Workshop - Software ...
Join ServiceNow for a dedicated technical practitioners workshop focused on how to use ServiceNow’s Software & Hardware Asset Management (SAM & HAM) to enable agencies to optimize costs and utilization of their asset investments to reduce spend, mitigate asset risk, and automate the full asset lifecycle with workflow—on a single platform. Register now to hear directly from our asset management experts and expect to take aw...
Securing Today’s Always-On, Always-Conn...
A wave of connected devices and the coming of age for new technologies like AI has created a dramatically broader and constantly evolving threat landscape for manufacturing organizations. And the gap between securing IT and OT environments is only complicating matters. Join WWT Manufacturing and Distribution Practice Director Don Rogers and Senior Security Practice Manager Rob Toscano as they discuss practical steps security leaders in the man...
GIS for Social Equity and Utilities
We believe everyone deserves access to reliable essential services like electricity, water, and internet, regardless of income or background. This means dismantling past injustices in how these services are provided. Why it Matters: Equitable utilities strengthen communities! They boost health by providing clean water and power, create economic opportunities, and reduce the environmental burdens that often fall heaviest on disadvantage...
Reduce Risk, Enhance Response: Ransomwa...
Every year, ransomware continues to be a persistent and evolving threat in the realm of cybersecurity. As technology advances, ransomware adapts, making it essential for state and local government to stay vigilant and implement robust security measures. The impacts of ransomware extend beyond financial losses, encompassing data breaches, reputational damage, and operational disruptions. Defending your agency against these threats requires pro...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.