Forescout Contract for Comply-to-Connec...
After November 30, 2024, DISA will no longer be providing free Forescout software licenses, professional services and training for the Comply-to-Connect (C2C) program. Over the past few years, the C2C contract with Forescout has enabled thousands of DoDIN users to receive Forescout licenses from DISA at no cost to the users’ budget. To this day, Forescout is still the backbone of C2C, which provides device visibility, device control, NAC...
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer:
FedInsider Location:
Webcast
Revolutionizing Cloud Data Security wit...
As data volumes continue to soar and regulations become increasingly stringent, organizations grapple with the challenge of comprehending their sensitive data, controlling access to it and pinpointing potential vulnerabilities. To regain visibility and control, forward-thinking organizations are turning to data security posture management coupled with data detection and response. In this session, you'll learn:The security and compliance risks...
Sales and Order Management
Transform your sales and order management processes with faster time to market with an integrated, easily configurable commercial and technical catalog. Connect and automate your siloed sales, quote, and order fulfillment processes on a single platform and empower your service teams to provide post-sales support for commercial changes to products, services, contracts, and entitlements.
June 27, 2024
Organizer:
ServiceNow Location:
Webcast
Introduction to Governmental Accounting...
The public sector environment is fundamentally different from that in which private-sector organizations operate, thus different accounting and financial reporting practices have developed for governments. This two-hour internet training will provide a basic introduction to the conceptual and practical ways in which generally accepted accounting principles (GAAP) for governments differs from that used for private companies. It will familiarize...
Transform Public Safety Recruiting with...
Join us for an exclusive webinar where we will delve into a transformative case study from the Utah Department of Corrections. We will explore how strategic initiatives and process enhancements have dramatically improved the recruitment process for the Utah Department of Corrections. Here are some key takeaways you can expect: Cut Recruitment Timelines in Half: Learn how the recruiting timeline was reduced from over 90 days to just 45 days, re...
Rethinking Reserves: Using Data to Dete...
Governments are subject to financial shocks, including natural catastrophes, recessions, and more. Financial reserves (a “rainy day” fund) are essentially a form of self-insurance that governments use to buffer themselves against these risks. But what are the risks governments should be concerned about? What size of reserves is appropriate to cover risks? What opportunities are there to use commercial insurance to help cover these...
Transform IRS Operations With Red Hat O...
The Internal Revenue Service (IRS) is adopting AI/ML to enhance their mission capabilities, though the degree of adoption varies among teams. Common challenges include: Complexities and time needed for iterative cycles to train, test, select and retrain the ML model for optimal prediction accuracy Need for collaboration among cross-functional teams to refine workflows, processes and share tools and best practices Repeated dependency on IT ope...
Securing and Optimizing the Modern Deve...
In software development, efficiency and security are essential to innovation and operational success. As agencies and organizations have moved their testing and production to the cloud, development environments often lag, using outdated systems that reduce productivity and compromise security.Join us online to learn how Coder helps organizations create a centralized development network, which improves security and control and provides develope...
CTO Sessions: How-to Guide for Enhancin...
Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys used to encrypt/decrypt data must be secured, managed and controlled by the data owner. Thales TCT’s CipherTrust Data Security Platform unifies data encryption and unprecedented granular access controls with centralized key management—all on a single platform. This results in fewer r...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.