11 webcasts found
+ 318 past events found
Back to Search Begin New Search Save Search Auto-Notify
NIST Compliant Architectures and Soluti...
This webinar will discuss the DoD Pathfinder efforts for DevSecOps and how Palo Alto Networks, through Twistlock provides capabilities to meet security controls requirements. We will also review NIST SP-800-190 specified security controls, federal compliance standards, advanced threat detection, and response requirements against secure solutions for regulated cloud workloads as well as on-prem solutions which utilize containerized solutions. T...
Add Favorite
How to Deliver NIAP Compliant Mobile Ap...
The National Institute of Standards and Technology has partnered with the Department of Defense and several federal agencies to create a standardized mobile app vetting process for the National Information Assurance Partnership (NIAP) compliance. In 2019, NowSecure partnered with the U.S. Air Force to kick off the creation of an automated software security testing solution to enable NIAP compliance for mobile apps. This is an easy-to-use solut...
Add Favorite
Splunk ESI Contract & Air Force
Air Force has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to Air ForceHow to leverage the contractDon't miss...
Add Favorite
Splunk ESI Contract and DoD
DoD has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to DoDHow to leverage the contractDon't miss out. Registe...
Add Favorite
Improving Your DevSecOps Experience wit...
Bringing real-time decision-making capabilities to the warfighter requires a transformation within the U.S. Department of Defense (DoD) to meet the evolving skill demands of today's digital landscape.Join U.S. Marine Corps colleagues for a demonstration of introductory topics focused on enabling greater DevOps experience by leveraging Red Hat Openshift Container Platform (OCP), including:Understanding DevSecOps and microservices architecture b...
Add Favorite
Additive Manufacturing: The Next Genera...
The U.S. military maintains bases in more than 70 countries and territories around the world, some of them in inhospitable or hard-to-reach areas. When a piece of equipment fails – whether a weapon, a radar dish, or something more prosaic like a mess hall stove – getting replacement parts can be difficult and time-consuming, and the delay can cause anything from mild inconvenience to serious problems meeting the mission. Larger bas...
Add Favorite
Industry Perspectives on CMMC 2.0
With recent discussions about changes to the Cybersecurity Maturity Model Certification (CMMC), Defense Industrial Base organizations can be sure that the intent and desired outcome of the program remains. Join this webinar to hear from experts at Carahsoft, Baker Tilly, and Pillsbury on the evolving CMMC program and what this means for the Defense Industrial Base. Topics include: What are the proposed changes with CMMC 2.0? Why should organiz...
Add Favorite
Digitizing the POM for Faster Decision Cycles
DoD Leadership struggles to manage and allocate funds for various defense programs across each of its branches of the Armed Forces. There are guidelines to meet, as well as mission analysis, objectives, alternative courses of action and numerous, time-consuming data calls. The Program Objective Memorandum (POM) process requires managing voluminous datasets and reporting, as well as the challenge for perspective on what is currently funded and...
Add Favorite
The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
Add Favorite
Configuring Jira for Maximum Agility Webinar
Defense agencies rely heavily on being able to send and receive information in real-time to ensure mission-critical projects succeed. Atlassian's suite of agile tools allows teams to transform the way they create and deliver software. Join us on March 29th at 3:00pm (ET) as Ariel Partners' Chief Technology Officer, Craeg Strong, discusses their latest training initiatives with DoD personnel and how to best leverage agile practices with Atlassi...
Add Favorite
Back to Search Begin New Search