Back to Search Begin New Search Save Search Auto-Notify
December UiPath & Alpha Omega Integrati...
In this session, attendees will learn about: A multi-disciplinary pragmatic approach required to reduce the time it takes to complete a system going through ATO, or for re-certifying a system Alpha Omega Integration, A2O™ solution built in collaboration with the industry-leading automation vendor UiPath How A2O™ automates The discovery of ATO processes and tasks The collection of data from manual controls Executing controls ...
December 6, 2022
Organizer: UiPath Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Your Identity Attack Surface
94% of organizations have experienced an identity-related breach, making real-time identity threat detection and response a critical strategy for security teams.Regardless of if your users connect from a PC, Mac, or Chromebook (the primary identity store for most schools), Active Directory (AD) represents an especially attractive and vulnerable target for adversaries.Join SentinelOne as we cover:Real-time vulnerability assessment around identi...
December 6, 2022
Organizer: SentinelOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Vision 2023: How Digital Transformation...
The state of Texas wants to accelerate the use of next-generation technology to deliver secure digital services. To that end, it has released its 2022-2026 State Strategic Plan for Information Resources Management, which sets four overarching goals: Secure IT service delivery Advanced data management Strategic digital transformation Proactive approach to emerging technologies Just as Texas agencies are looking to modernize and transform their...
December 6, 2022
Organizer: FEDINSIDER
Location: Austin, TX
Add Favorite
Classified Mobility Solutions: Streamli...
Federal defense and civilian organizations responsible for communications acknowledge the critical need to improve mobility and remote work solutions for classified workers. Now, turnkey enterprise-class network solutions combined with industry-leading secure software are delivering the benefits of classified access to warfighters and remote and mobile workers in the field. These systems allow end users to use commercial mobile devices to acce...
December 6, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
FCL-GSA-0023 Basic Contracting for GSA...
Target Audience: Federal Agency and Military This comprehensive training course covers Federal Supply Schedules contracting and ordering procedures. It addresses placing orders against Multiple Award Schedules, as outlined in Federal Acquisition Regulation (FAR) Subpart 8.4. In this course you will learn about the unique flexibility within the GSA Schedules program. This is a four (4) CLP credit course. Note: This webinar satisfies the FAC-C L...
December 6, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
New Year, New Threats: What You Need to...
In this webinar, Joey Fitzpatrick, Lead Threat Analysis at IronNet, will share tips and tools to prevent impacts to mission-critical functions by blocking threats before a cyber-attack. As you prepare for 2023, do you have a comprehensive attack surface management plan to proactively stop cyber threats? Learn best practices to strengthen your cybersecurity posture and how IronNet's elite threat hunters can help you prepare.
December 6, 2022
Organizer: IronNet Government Team at Carahsoft
Location: Webcast
Add Favorite
Enabling Next Generation Military Techn...
What does the basic set up of ICAM look like in defense agencies and how do they maintain that security and expansion as they move forward? During part 1 of this exclusive webinar series, moderator Tom Temin will discuss ICAM with agency and industry leaders. Stay tuned for parts 2 and 3 of this series where Tom and his guests will discuss mission partner environment networking and 5G. Learning objectives: Current state of ICAM Use of ICAM as...
December 6, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Effective Use of the COSO Framework (16 CPEs)
4, ba Our approach for this in-person training event is to provide the relevant information which internal control professionals will need to fulfill the "Internal Control Life Cycle" using the "top-down, risk-based" approach. We provide the background knowledge sources, advice on how to conduct risk assessments, discuss scoping, and review how to plan the assessment of an internal control framework based on COSO. Risk management activities ar...
December 1-2, 2022
Organizer: Corporate Compliance Seminars
Location: Dulles, VA
Add Favorite
Columbus CyberSecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
December 1, 2022
Organizer: FutureCon
Location: Columbus, OH
Add Favorite
INTERFACE Seattle 2022
WELCOME TO INTERFACE Seattle 2022! IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to needs for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educa...
December 1, 2022
Organizer: F2F Events, Inc.
Location: Seattle, WA
Add Favorite
Back to Search Begin New Search