Enabling Secure Data Storage and Sharin...
In 2021, the White House issued memorandum OMB M-21-31, requiring federal agencies to retain information system logs for extended periods to combat cyber threats effectively. However, complying with this mandate presents challenges due to the high costs associated with storing and sharing vast amounts of data. Mark your calendars for a government webinar featuring insights from data experts at Databricks and Deloitte, including: Navigating M-...
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer:
FedInsider Location:
Webcast
Procurement Integrity - Analytics to Re...
SAS' solutions introduce an approach to layer an analytic system on top of your existing systems, creating a continuous monitoring solution. In their upcoming webinar, subject matter experts will highlight real world examples, showing how other government entities improved their procurement and accounts payable processes by integrating with SAP, Oracle and other ERP systems. Join SAS' webinar, where you can also expect to learn more about: Ris...
Achieving Cybersecurity Resilience in S...
New Mexico recently issued Executive Order 2024-011, a comprehensive state-wide security assessment to identify vulnerabilities in cybersecurity and necessitates that all state agencies adopt the National Institute of Standards and Technology (NIST) standards for cybersecurity by November 1, 2024. Register now to hear how Synopsys can help you navigate the requirements of EO 2024-011 and secure your critical applications. Join Synopsys on Jun...
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Join critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics will include: How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and...
Combatting Emerging Threats: Proofpoint...
Proofpoint, BluVector and Carahsoft are excited to invite you to join us in the lead up to TechNet 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. The digital evolution is moving quick, and it’s easy to be overwhelmed and click (or scan) something you shouldn’t have. Join us for an exclusive webinar where experts from Proofpoint and BluVector wi...
Leveraging NASPO for Continuous Situati...
Lead time is critical when responding to public safety emergencies. Decision-makers need clarity and context as an event unfolds to effectively manage their operations to bolster first response, transportation, infrastructure protection and emergency management. Artificial intelligence can help deliver reliable, relevant, real-time information for public sector organizations to protect the people and communities they serve by providing them wi...
Tableau Enablement Series Part 6 - Clea...
Navigate the age of AI with confidence in our Tableau Prep webinar, tailored for public sector professionals. In an era where data-driven decision-making is paramount, the integrity and trustworthiness of your data are more crucial than ever. This webinar is designed to empower you with robust data preparation techniques, ensuring that your datasets are not only clean and well-structured but are also reliable and AI-ready. During this webinar...
Securing AI: Cybersecurity Operations/S...
Join us for our new two-day, interactive global workshops focused on identifying opportunities and managing the risks associated with artificial intelligence. Engage with your peers as we take an in-depth, hands-on look at how to secure the use of AI and discover ways AI uses our data through a practical risk management lens. Securing AI: Cybersecurity OperationsGain essential tools to secure systems in the AI era. Learn how AI can impact both...
June 20-21, 2024
Organizer:
ISC2 Location:
Denver, CO
INTERFACE Phoenix 2024
Welcome to INTERFACE Phoenix 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.