AI Security Governance 101: Your Essent...
Open Source software (OSS) is driving innovation in the public sector worldwide, particularly in artificial intelligence (AI), data science and new software development. As AI advances at groundbreaking speeds, the security of open source software has never been more important. Effective risk management strategies are crucial. Join Anaconda on July 25th for AI security governance essentials, including how to:Assess and secure your software sup...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then moves i...
Getting Started with Elastic AI ...
Do you struggle with accessing critical information within your organization's ever-growing data landscape? Traditional search methods are often ill-equipped to handle the increasing volume and complexity of data. Vector databases revolutionize search by enabling AI to understand data, leading to lightning-fast and relevant searches on complex datasets. Join Elastic on Tuesday, July 30, for insights on how you organization can:Develop a powerf...
Can Mobile Security & Privacy Coexist?
State and Local Governments face heightened cybersecurity risks due to their critical role and resource constraints. Join us Quokka experts on July 30th as they explore common security weaknesses found in mobile apps. Hear strategies that can strengthen your mobile security and mobile app development. Register now to:Identify common mobile app security weaknesses and how they can be leveraged to extract valuable dataNavigate the privacy concer...
Complying with the New Federal Cybersec...
Join Fend, Loop1, SolarWinds and Carahsoft for an informative webinar that unveils a robust approach to air-gapping networks, delivering superior protection and continuous monitoring of critical assets while maintaining stringent security standards. Navigating new cybersecurity mandates can be daunting. The Department of Defense and government agencies face immense challenges in complying with DHS BOD 23-01, OMB M-24-04 and DoD Manual 8530.01,...
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
INTERFACE Montana 2024
Welcome to INTERFACE Montana 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise...
Transform Public Sector Pay with Earned...
Join us for a webinar on transforming public sector pay. Don't miss out on this great opportunity! In this webinar attendees will learn about: The benefits of changing how you pay your employees. Boosting recruitment and retention by adding new benefits like earned wage access (EWA). Implementing EWA without changing your payroll systems. Empowering employees with control and peace of mind.
OASIS+ DPA Training
Join us for Delegation of Procurement Authority (DPA) training for the new OASIS+ contract program. About OASIS+OASIS+ is a new government wide, multiple-award indefinite-delivery indefinite-quantity (MA-IDIQ) multi-agency contract (MAC) program designed to address government agencies' mission needs for a full range of service requirements that integrate multiple service disciplines and ancillary services and products. The OASIS+ program will...
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we will focus on these new security threats and provide you with real-world examples of so...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.