Back to Search Begin New Search Save Search Auto-Notify
Haystack CTF: The Hunt for IOC's
Immerse yourself in the world of Intrusion Detection in our new Blue Team game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss! An up-and-coming hacker prodigy known as Leopold falls into debt with The League after unsuccessfully trying to hack into The League's network to exploit th...
June 27, 2024
Organizer: World Wide Technology
Location: Virtual
Add Favorite
High-Bandwidth Oscilloscopes for Multi-...
When warfighters enter the battlefield, whether in the sky, on the ground or at sea, they depend on sophisticated radar and electronic attack jammer systems to protect them from harm. Advancements in digitizing technology and analysis software enable EW systems to undergo testing in the lab before they reach a real conflict. High-bandwidth oscilloscopes can be used for multi-port, coherent RF pulse analysis. With the combination of real-time d...
June 27, 2024
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Neurodiversity in Cybersecurity Summit 2024
As the cybersecurity talent shortage persists, with an estimated 700,000 unfilled jobs, the industry needs to redouble its efforts to attract and retain workers. One important way to accomplish this is by recognizing that jobs and workplaces can’t be “one size fits all.” As many as 20% of adults are neurodivergent (ND), and when we fail to account for the unique strengths, experiences, and challenges of neurodivergent cyberse...
June 27, 2024
Organizer: SANS Institute
Location: Virtual
Add Favorite
Part 2: Preventing Avoidable Cloud Wast...
In the adoption phase of the cloud journey, organizations suffer from a lack of visibility and tracking around what developers can provision, which can lead to over-provisioning and idle or underused resources. In part two of our webinar series, Optimize Cloud Spend with HashiCorp Terraform, you’ll learn how Terraform helps you avoid overspending in the adoption phase of your cloud journey. We’ll cover: What the adoption phase of t...
June 27, 2024
Organizer: HashiCorp
Location: Webcast
Add Favorite
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer: GovExec
Location: Virtual
Add Favorite
Enable a Whole New Way to Work. Buildin...
Cybersecurity risks are evolving in today’s digital landscape. Since September 2022, human-operated ransomware attacks increased by more than 200%.1 Organizations that embrace a comprehensive security strategy can thrive by building a secure, flexible work environment.Creating a secure data architecture prepares your organization to embrace AI-powered tools, such as Microsoft Copilot, that are unlocking productivity gains and innovation...
June 27, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
The ONE Thing That Will Guarantee Succe...
'It's not what you know, but who you know.' In federal sales success, that is absolutely true. Relationships lead you to predictable, repeatable results. FREE LinkedIn live The ONE Thing That Will Guarantee Success for Government Contractors Join Neil McDonnell for a dynamic 30-minute BD training designed specifically for small business government contractors like you. Topics:The 3 essential federal relationships needed for successful salesHow...
June 27, 2024
Organizer: GovCon Chamber
Location: Virtual
Add Favorite
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Redefine the Future of Constituent Enga...
There's a lot of buzz surrounding generative AI, but the advantage of the technology goes beyond buzzwords. AI solutions offer significant value to operations and reduce pain points for governments and the residents they serve. Join Government Technology and NICE for a live webinar on how governments can use AI and other modernization tactics to enhance service accessibility and create seamless constituent experiences. Here's what's in store:...
June 27, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Effective Market Research (MRAS)
Target Audience: Federal/State/Local Agencies and Military Attention all public sector employees in the contracting and acquisition career field! In GSA's Market Research As a Service (MRAS) Customer Training: Effective Market Research (Fed/Military), you'll learn the importance of market research, how and when to conduct it, and how to get the best results by making your data collection methods more efficient. You'll also delve into the regul...
June 27, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search