Back to Search Begin New Search Save Search Auto-Notify
How to Build an Information Security Pr...
This regional in-person symposium has been updated to a virtual event and is intended for practitioners from the Philadelphia metro area. The strongest security organizations move beyond merely reacting to incidents and fighting fires. They are self-aware, recognize their weaknesses and create roadmaps to move their programs from current to enhanced states. They establish a culture of continuous improvement and keep their eyes on the horizon a...
December 10, 2020
Organizer: IANS
Location: Webcast
Add Favorite
New Approach to Multi-Factor Authentication
Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to ensure the identities of entities within a Public Key Infrastructure (PKI). Two primary components of multi-factor authentication are "what you have"--such as a securely stored private key--and "what you know", a password to unlock access to the securely-stored credentials. For human users, multi-factor authentication is easil...
December 10, 2020
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
Adopt People-Centric Information Protection
In today's current cybersecurity landscape, information protection has become more difficult, and traditional tools aren't well-designed for the modern environment. Data doesn't lose itself. It always involves a person - whether it's a negligent, compromised, or malicious user.A people-centric approach to enterprise DLP can succeed where legacy DLP solutions have failed, and with Proofpoint's people-centric DLP platform, it brings together the...
December 10, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Splunk Phantom Virtual Workshop
Join us for a Splunk Phantom virtual workshop. This workshop is designed to familiarize participants with how to respond to incidents, manage cases and artifacts, as well as automate your incident response and standard operating procedures.Users will have the opportunity to walk through real-world scenarios and see first-hand how Phantom can be used from the creation of notable events to enriching alerts by automatically gathering data, all th...
December 10, 2020
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Conquering Data Privacy's Biggest Chall...
Addressing data retention is the surest way to mitigate risks and costs of a data breach. With numerous regulations such as GDPR and California’s ballot initiative CCPRA requiring organizations to provide up-to-date and enforced retention schedules, it’s more important than ever that your organization maintains compliant practices to minimize damages. Understand if your organization is at risk and take action now. In this webcast,...
December 10, 2020
Organizer: Exterro
Location: Webcast
Add Favorite
IFRS Institute: Year-End Update
he KPMG IFRS Institute is pleased to announce a webcast on Thursday, December 10, Year End Update. This 60-minute live IFRS webcast summarizes the key 2020 standard-setting developments that may be relevant to IFRS preparers for their annual financial statements. This includes a summary of the IASB’s and IFRS Interpretations Committee’s recent and forthcoming activities. Presented by partners and professionals from KPMG’s Dep...
December 10, 2020
Organizer: KPMG
Location: Webcast
Add Favorite
Securing DevOps with Containers, Encryp...
When bad actors attack, data encryption is the first and the last line of defense. Container image scanning, container runtime stack protection, and perimeter protection are important, but data security should start with protecting the data itself. Join industry experts from Red Hat, Fornetix and Zettaset on December 10th for a technical dive into their integrated solutions that offer enterprise level encryption on a leading hybrid cloud, ente...
December 10, 2020
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Developing an RFP for an ERP System
There are few projects that local governments will take on that reach the size, scope, and complexity of an enterprise resource planning (ERP) implementation. Not only do ERP projects touch just about everything and everyone in the organization, they also can represent significant change for an organization. ERP projects are expensive requiring investments not only in dollars, but in time, creating the expectation that governments will see sig...
December 10, 2020
Organizer: GFOA
Location: Webcast
Add Favorite
Transform Data: Protect. Automate. Modernize.
The value and integrity of trusted federal data is critical to performing agency missions, delivering government services, and maintaining the public good. Data is particularly important in the current pandemic environment as government agencies, scientists, and the public work to understand and respond to COVID-19 using data-focused approaches. The need to protect, automate, and modernize government data is driven by a multitude of factors fr...
December 9-10, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity Governance Forum - The Evoluti...
This year the pivot to virtual work happened practically overnight. It was unprecedented and it was mandatory. It was also enlightening. The Evolution of Identity governance forum will dive into how the past few months have revealed the critical role identity plays into security.As government agencies move to modernize identity to support digital transformation and adapt to new missions, they must look across their complete portfolio of identi...
December 8-10, 2020
Organizer: SailPoint
Location: Virtual
Add Favorite
Back to Search Begin New Search