Back to Search Begin New Search Save Search Auto-Notify
Federal Insights Exchange Session - Lif...
A 2019 Journal of the American Medical Association (JAMA) article offered an “…analysis of all US military casualties from October 2001 through December 2017 found that survival among the most critically injured casualties increased 3-fold during the course of the conflicts and that 3 key interventions (tourniquets, blood transfusions, and prehospital transport within 60 minutes) were associated with 44% of mortality reduction...
April 6, 2021
Organizer: ACT-IAC
Location: Webcast
Add Favorite
Cyber Resilience Fireside Chat: Securin...
How do you evolve the security of your software supply chain? SAFECode and SANS have guidance intended to help developers achieve supply chain security, and to help customers gain confidence in the security of their supply chains. Join us to hear about some of the work being done across the industry to support both suppliers looking to improve their supply chain security practices and customers seeking to evaluate and manage their own risks. W...
April 6, 2021
Organizer: Micro Focus
Location: Virtual
Add Favorite
Speaking of Money: Automating DoD’s Bud...
While much attention has been paid to DoD audits and the savings they’ve identified, that’s only one side of the balance sheet.Automating the budget formulation process also can identify funds to support the military mission and foster data-centric decisions on budget priorities.Join us for an in-depth discussion of how automating and streamlining financial management and budgeting is facilitating planning, allocating and adjusting...
April 6, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity-Centric Security: The New Agen...
COVID-19 has accelerated the need for Privileged Identity Management (PIM). As remote agency workforces expand, there is little question that Privileged Identity Management will play an increasingly crucial role in mitigating cyber-attacks. Recent cyber breach news is a reminder that privileged credentials are highly targeted by threat actors. During this webinar, we’ll discuss: Why Privileged Identity Management is a cornerstone of mod...
April 1, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Securing the Remote Workforce – A Movin...
When the first lockdown orders in response to the COVID-19 pandemic were issued in March 2020, many agencies at all levels of government had to scramble to accommodate large numbers of their workers suddenly teleworking. The importance of implementing securing zero-trust security methodology (or architecture)– maintaining strict access controls and not trusting any user automatically, whether inside or outside the network perimeter ...
April 1, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Endpoint Security: Bolster Defenses Aga...
Active Directory (AD) is the threat actor’s chosen attack vector. As the most widely used service for managing and controlling resources in an enterprise, AD provides complete visibility into where the sensitive data lives and who has permission to access it. Join us in a webinar, April 1, 2021, 11 am PST, where Head of Threat Defense Roi Abitboul discusses the challenges of protecting this highly vulnerable IT asset. You will:• Lea...
April 1, 2021
Organizer: Broadcom
Location: Webcast
Add Favorite
Internet of Military Things: A Deep Div...
The concept of the Internet of Military Things (IoMT) brings clear, actionable data to the forefront, filtering away the noise to get to what really matters. In this course, we will explore the ins and outs of integrating sensors effectively across military base ecosystems. We’ll identify common challenges, draw insights from installations, and learn how to leverage devices at the edge. Do you know how the Department of Defense can integ...
April 1, 2021
Organizer: MeriTalk
Location: Webcast
Add Favorite
Open Data Science Conference (ODSC) East
ODSC is the best community data science event on the planet. There are other events that cover special topics, or industries, etc., but ODSC is comprehensive and totally community-focused: it's the conference to engage, to build, to develop, and to learn from the whole data science community. ODSC East 2021 is one of the largest applied data science conferences in the world. Our speakers include core contributors to many open source libraries...
March 30 - April 1, 2021
Organizer: ODSC
Location: Virtual
Add Favorite
2021 DFAR Part 213: Simplified Acquisit...
Join Jennifer Schaus & Associates in this complimentary webinar series on Wednesdays at 12pm eastern. We will uncover each Part of The DEFENSE FEDERAL ACQUISTION REGULATIONS (DFARS). Recordings can be found on our website and YouTube channel with 400+ other federal government contracting webinars. Questions? Contact hello@JenniferSchaus.com or 202-365-0598
March 31, 2021
Organizer: Jennifer Schaus & Associates
Location: Webcast
Add Favorite
Palo Alto Networks ML-Powered Next-Gene...
In this free, two-hour virtual workshop, you will configure security policies that will ultimately restore visibility and control over the applications, users and content traversing your network. During this workshop you will: Configuring Inline ML-Powered malware and phishing prevention Leveraging Policy Optimizer to migrate from port-based to application-based security policies Configure decryption to inspect and allow TLS 1.3 traffic Secure...
March 31, 2021
Organizer: Palo Alto Networks
Location: Virtual
Add Favorite
Back to Search Begin New Search