Next Generation Cloud Services for Redu...
Advanced cyber security breach techniques by nation states were wildly successful over the past few months. Thus, a new attack surface within the software supply chain has been exposed and is driving new requirements and shifting the focus of cyber protection across industries and software solution providers. In response, software technology companies worldwide are implementing changes and recommending organizations protect their software supp...
GSA Greater Southwest Region Training Seminar
Attend the monthly GSA Greater Southwest Region Training Seminar! Free training on GSA acquisition solutions, programs, and resources available in Texas, New Mexico, Oklahoma, Arkansas and Louisiana. GSA Greater Southwest Region Training Seminar GSA offers a wide variety of training opportunities for your agency. The training is free, and you can earn three Continuous Learning Points (CLPs) for attending all classes. With this recurring semina...
How Defending Against Ransomware Goes B...
Ransomware attacks have been making headlines again and again. Ransomware evolves and new ones are not only encrypting data and damaging business continuity, but they have also lead to public data leaks of confidential information. CyberArk's solution enables to mitigate the risk related to ransomware by implementing the least privilege approach and credential theft protection to prevent the attack on the machines where it lands, combined with...
Government Contract Compliance
The best way to remain in compliance is to implement a proactive Government Compliance Program Our training covers the foundations of federal government contracting and keeps you up-to-date on emerging topics in the federal contracting industry. Government contracting is a highly regulated environment, with significant penalties for non-compliance with laws, regulations, and contract provisions. The best way to remain in compliance is to impl...
Amsterdam: US Export Controls for EU, N...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR) as they apply to NON-US COMPANIES: This seminar series provides both novice and experienced export compliance professionals with an in-depth education on compliance with International Traffic in Arms Regulations (ITAR),...
Adobe ColdFusion Workshop
Join our complimentary Adobe ColdFusion Workshop to learn how you and your agency can leverage ColdFusion to create amazing web content. This one-day training will cover all facets of Adobe ColdFusion that developers need to build applications that can run across multiple cloud providers or on premise. Specifically, the workshop will explore: The major features in the latest release of Adobe ColdFusion How to use CFML to develop, test, and dep...
Facing the Threat of Ransomware
There were more than 2,300 ransomware attacks against all levels of government, healthcare facilities, and schools and higher education institutions in 2020, and the attacks have continued this year. Yet state, local, and education (SLED) organizations are ill-equipped to respond to such attacks, lacking the resources and capabilities to defend against or respond to them. The Cybersecurity and Infrastructure Security Agency has established Sto...
October 13, 2021
Organizer:
FEDINSIDER Location:
Webcast
ElevateIT: Houston Technology Summit 2021
Expanding and Evolving within the Digital Revolution At the heart of the Digital Revolution is quick-term, short-term, and long-term growth and profitability. The acceleration of automation development from inception throughout the supply chain will drive customer demands now and in the future. Simply put, companies embracing faster a positive seamless digital customer experience will be the relevant companies for the future. Employing effecti...
Cybersecurity Executive Order: 10 Datab...
In today's digital economy, data is the lifeblood of business. Protecting sensitive data has become more challenging for organizations in recent years. It's not simply the increase in the volume of data or the increase in threats - it's also the fact that as organizations have become more digital, they are moving more of their data and IT infrastructure to a mix of private and public clouds. With the additional impact of the recent Presidentia...
The Official 2021 Cyber Security Summit...
To protect the health and safety of attendees, all 2021 summits have been moved to a virtual platform due to COVID-19 concerns. The Official Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. These events maintain as much of the traditional tradeshow experience as possible with a...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.