The Future of Cloud in 2027: From Techn...
As cloud computing evolves from technology enabler to business disruptor, IT leaders must ensure they understand their organization’s business strategy. Only then can they seek opportunities to leverage new and emerging cloud capabilities to accelerate that strategy. This free webinar reveals Gartner’s top predictions for where cloud computing will be by 2027, and explores how these predictions will shape your cloud value propositi...
November 15, 2022
Organizer:
Gartner Location:
Webcast
Intelligent Transportation: Cybersecuri...
Emerging technologies and Internet of Things (IoT) sensors are ushering in a new era for transportation – and increasing concerns about cybersecurity and data privacy. As our transit networks become increasingly data-rich environments – with hundreds of thousands (or millions) of connected sensors and endpoints – it becomes crucial to secure data at the point of production. And protecting personally identifiable information...
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
Cyber-SCRM Educational Training Series
You are invited to join the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP). Since the launch of the C-SCRM ACoP, GSA and CISA have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the Federal Government for information communication technology and services (ICTS). Why Should Y...
Insider Threats for Systems Integrators...
Join the Proofpoint team and dive into the Insider Threats impacting your organization and new Federal requirements for the Federal Systems Integrator community. Vulnerable employees, bad actors, and cybercriminals continue to threaten national security, but with the right cybersecurity solutions your organization can prevent and protect against insider threats. Learn how Proofpoint can provide deeper insight and mitigation strategies. In this...
SANS DFIRCON 2022: Keynote - What Makes...
Staying current in DFIR is more than just doing the job daily. It takes work. Those who put forward an effort to research, train and share seem to carve a special place for themselves in this community. Do you have what it takes? Do you want to do more in forensics and with your education? This talk will walk you through lessons learned and methods to get the most out of DFIR and enhance your daily work.
Reporting Requirements Made Easy with D...
State and local governments are expected to deliver projects that adhere to regulatory compliances, Diversity, Equity and Inclusion requirements and other standards. New funding opportunities, such as those made possible by the Infrastructure Investment and Jobs Act also require governments to meet different equity markers. Agencies need to streamline the tracking and reporting of performance metrics to take full advantage of future financing...
Keeping the Government Workforce Produc...
The hybrid workforce and direct-to-app architectures have rendered legacy security architectures obsolete while dramatically increasing our attack surface. Cloud based security with ZTNA 1.0 approaches have emerged as potential solutions, but they only solve part of the problem, failing to adequately secure today's work-from-anywhere users and direct-to-app architectures.This session will explain a modern approach to ZTNA and how it is imperat...
Security Programs That Thrive in Econom...
With economic conditions causing concerns, many security teams with limited resources are sacrificing security initiatives for cost containment. All while expanding attack surfaces are requiring more time and attention than ever before. If this problem sounds familiar, join us to learn how managed detection and response solutions, integrated with existing security investments, can more quickly establish an acceptable ROI while dramatically re...
Directive M-19-21: Record Digitization
Directive M-19-21 is driving Federal agencies to digitize their hardcopy records and shut down their records storage facilities. Join our two-part Archive360 webinar series and learn what your agency needs to do to reduce the costs and risks of digitizing and managing paper records. Part 1: Directive M-19-21: Next Steps - What To Consider After Digitizing Record Keeping Since Directive M-19-21's announcement, the big question is: how to store...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.