Back to Search Begin New Search Save Search Auto-Notify
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
FCW Workshop: Public Safety
From wildfires and hurricanes to increasing crime rates and the continuing pandemic, public safety organizations at all levels of government find themselves spread thin these days. However, a continued wave of technology innovations can help fill their need for better data, quicker response and effective delivery of services. The move of many public safety organizations to the cloud has opened new options for using and sharing operational data...
Add Favorite
Zero-Trust Mobile Application Environment
With the pandemic, the DOD has to depend on and leverage mobility even more. This has only increased the demand and desire for more first and third party applications to be deployed. With the rush of demand comes the struggle to deploy without SOP's. NowSecure can optimize your mobile AppSec pipeline to meet that demand.With the push for these new mobile applications, many agencies have discovered there is a need for integrated continuous test...
Add Favorite
Innovating the Way the DoD Does Business
In this upcoming webinar, subject matter experts will discuss how we are transforming business processes to aggregate data and facilitate innovation in the DoD. While innovation takes many forms, by-products, and opportunities, agencies and departments need to be able to understand their data scope so they can discover, analyze, redirect, take action, and ultimately innovate.That's where CORAS is the pivotal SaaS tool. We use business intellig...
Add Favorite
Configuring Jira for Maximum Agility Webinar
Defense agencies rely heavily on being able to send and receive information in real-time to ensure mission-critical projects succeed. Atlassian's suite of agile tools allows teams to transform the way they create and deliver software. Join us on March 29th at 3:00pm (ET) as Ariel Partners' Chief Technology Officer, Craeg Strong, discusses their latest training initiatives with DoD personnel and how to best leverage agile practices with Atlassi...
Add Favorite
Mastering DoD Portfolios from Cradle-to-Grave
The DoD struggles to have visibility across multiple portfolios and budgets and it can be almost impossible to get the information you need in the time frame you need it. CORAS eliminates this challenge. The key to effective cross organizational management is to have the ability to view the full scope of your programs and understand where their commonalities lie, as well as their deadlines, budgets, and performance metrics. Join us for a webin...
Add Favorite
Leveraging Visibility to Plan for Painl...
During this discussion-based webinar, attendees will learn: How to quantify and map the performance of applications pre-migration How to identify high-risk applications before migration How to ensure newly migrated applications perform as expected What do we do when applications in the cloud aren’t performing How maximize performance, while minimizing costs
Add Favorite
The Role of Digital Technology in Succe...
The Infrastructure Investment and Jobs Act, signed into law in November 2021, will unleash a flood of funding for a vast array of construction projects, including electric grid and energy improvements, roads and bridges, public transit, and water systems to name just a few. It is worth celebrating that so much will be repaired, replaced, or new-built. It also highlights a new opportunity to bring digitization to the construction industry, brin...
Add Favorite
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
Add Favorite
AI, Machine Learning and Strengthening...
The federal government is dedicated to advancing U.S. leadership in the research, development and use of artificial intelligence (AI), to promote both national security and economic prosperity. Using AI to improve cybersecurity is a logical target for its implementation. It is especially important as the threat landscape continues to evolve. The World Economic Forum (WEF) reports that about 1.7 billion IoT devices have been installed to date i...
Add Favorite
Back to Search Begin New Search