(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
FCW Workshop: Public Safety
From wildfires and hurricanes to increasing crime rates and the continuing pandemic, public safety organizations at all levels of government find themselves spread thin these days. However, a continued wave of technology innovations can help fill their need for better data, quicker response and effective delivery of services. The move of many public safety organizations to the cloud has opened new options for using and sharing operational data...
Zero-Trust Mobile Application Environment
With the pandemic, the DOD has to depend on and leverage mobility even more. This has only increased the demand and desire for more first and third party applications to be deployed. With the rush of demand comes the struggle to deploy without SOP's. NowSecure can optimize your mobile AppSec pipeline to meet that demand.With the push for these new mobile applications, many agencies have discovered there is a need for integrated continuous test...
Innovating the Way the DoD Does Business
In this upcoming webinar, subject matter experts will discuss how we are transforming business processes to aggregate data and facilitate innovation in the DoD. While innovation takes many forms, by-products, and opportunities, agencies and departments need to be able to understand their data scope so they can discover, analyze, redirect, take action, and ultimately innovate.That's where CORAS is the pivotal SaaS tool. We use business intellig...
Configuring Jira for Maximum Agility Webinar
Defense agencies rely heavily on being able to send and receive information in real-time to ensure mission-critical projects succeed. Atlassian's suite of agile tools allows teams to transform the way they create and deliver software. Join us on March 29th at 3:00pm (ET) as Ariel Partners' Chief Technology Officer, Craeg Strong, discusses their latest training initiatives with DoD personnel and how to best leverage agile practices with Atlassi...
Mastering DoD Portfolios from Cradle-to-Grave
The DoD struggles to have visibility across multiple portfolios and budgets and it can be almost impossible to get the information you need in the time frame you need it. CORAS eliminates this challenge. The key to effective cross organizational management is to have the ability to view the full scope of your programs and understand where their commonalities lie, as well as their deadlines, budgets, and performance metrics. Join us for a webin...
Leveraging Visibility to Plan for Painl...
During this discussion-based webinar, attendees will learn: How to quantify and map the performance of applications pre-migration How to identify high-risk applications before migration How to ensure newly migrated applications perform as expected What do we do when applications in the cloud aren’t performing How maximize performance, while minimizing costs
The Role of Digital Technology in Succe...
The Infrastructure Investment and Jobs Act, signed into law in November 2021, will unleash a flood of funding for a vast array of construction projects, including electric grid and energy improvements, roads and bridges, public transit, and water systems to name just a few. It is worth celebrating that so much will be repaired, replaced, or new-built. It also highlights a new opportunity to bring digitization to the construction industry, brin...
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
AI, Machine Learning and Strengthening...
The federal government is dedicated to advancing U.S. leadership in the research, development and use of artificial intelligence (AI), to promote both national security and economic prosperity. Using AI to improve cybersecurity is a logical target for its implementation. It is especially important as the threat landscape continues to evolve. The World Economic Forum (WEF) reports that about 1.7 billion IoT devices have been installed to date i...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.