Back to Search Begin New Search Save Search Auto-Notify
Don't Get Blindsided by Mobile Gaps in...
Mobile Application Security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include Mobile App vetting is now upon us.Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created a...
June 28, 2022
Organizer: NowSecure Government Team at Carahsoft
Location: Webcast
Add Favorite
Summertime Refresh: Securing Chromebook...
Join this webinar with SentinelOne, Zimperium, and Carahsoft where our mobile experts will discuss: Why states and educational institutions use Chromebooks Cyber threat challenges and concerns Chromebook users face What can be done to protect Chromebook users, including K-12 students How Chromebooks play into K-12 holistic endpoint security strategy
June 28, 2022
Organizer: Zimperium Government Team at Carahsoft
Location: Webcast
Add Favorite
Threat Predict -Leveraging AI/ML to Pro...
Preventing known threats is no longer enough to keep you protected. The mere volume of logs and events often presents a significant challenge for security teams. Through testing and research SkyePoint engineers recognized the advantages of strong ML concepts and developed an approach to leverage them through a collaborative effort between human analysts and AI. This results in a significant increase in the ability to obtain and identify potent...
June 28, 2022
Organizer: TIBCO Government Team at Carahsoft
Location: Webcast
Add Favorite
Leveraging Artificial Intelligence Tech...
Like most law enforcement agencies across the nation, the Henderson Police Department, located near Las Vegas, Nevada, was not immune to the growing nationwide trend for more public transparency in law enforcement. Over the past year, the number of Freedom of Information Act (FOIA) requests for public access to police audio and video evidence such as body-worn camera, in-car dash cameras, jailhouse calls, and surveillance camera footage, have...
June 28, 2022
Organizer: Veritone Government Team at Carahsoft
Location: Webcast
Add Favorite
Source Zero Con
Source Zero Con brings the technical community together to educate future security leaders. This virtual event focuses on tactics and techniques in offensive and defensive security and allows you to virtually connect with peers and technical experts to explore new security concepts and capabilities through presentations and interactive workshops. Ranging from beginner to advanced sessions, our Source Zero research and innovation team will prov...
June 22-24, 2022
Organizer: Optiv
Location: Virtual
Add Favorite
Identiverse 2022
Identiverse is where the identity security community comes together. Now in its 13th year, Identiverse is a must attend annual event that brings together over 2,000 security professionals for 4 days of world-class learning, engagement, and entertainment. Offering over 70 hours of top-notch content showcasing enlightening keynotes, informative panels, and hands-on masterclasses—attendees can connect with their peers during networking rece...
June 21-24, 2022
Organizer: CyberRisk Alliance
Location: Aurora, CO
Add Favorite
HUBZone Status
The regulations governing the interaction of small businesses in federal government contracting are complex and often undergoing changes. Please join us for a webinar series that explores the relevant rules and what government contractors should consider when claiming a particular size and/or status as well as considerations for entities that mentor and/or acquire small businesses. Crowell & Moring will address individually small business...
June 23, 2022
Organizer: Crowell & Moring
Location: Webcast
Add Favorite
Lessons Learned from Automation Success...
Cognilytica is hosting Kathleen Walch and Ron Schmelzer, Managing Partners at Cognilytica and their presentation ‘Lessons Learned from Automation Success: Identifying What and When to Automate’ on Thursday, June 23, 2022 at 11:30 AM ET! For organizations who want to get started on their AI journey, a great first place to start is with automation. However, figuring out what to automate, why to automate, and what return on investment...
June 23, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
okta Gov Identity Summit 2022
Identity underpins every public sector priority today, and identity modernization unleashes the full potential of digital government. The 2022 Okta Gov Identity Summit brings together top leaders from the public sector community to address the urgency of identity modernization. They will discuss how cloud-smart identity accelerates zero trust adoption, strengthens national defense, fights fraud, and improves customer experiences. Experts will...
June 23, 2022
Organizer: CyberScoop
Location: Arlington, VA
Add Favorite
Understanding and Planning for Phishing...
The May 12, 2021 White House Executive Order 14028 and subsequent Office of Management and Budget Memo M-22-09 set forth a Federal Zero Trust Architecture strategy and a new baseline for access controls. In order to reinforce the government’s defenses against increasingly sophisticated and persistent threat campaigns, agencies are now required to meet specific cybersecurity standards and objectives by the end of fiscal year 2024. M-22-09...
June 23, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search