Splunk Fundamentals Bootcamp
About the Splunk Fundamentals Bootcamp – Designed as an introduction to the capabilities, interface and basic search and reporting of Splunk. Emphasis is placed on investigation and discovery through demos and hands-on labs culminating in a customized situational dashboard. Previous experience with Splunk is not required. Where: Live Hands-on WebEx Webinar When: Check the GTRI Events Page for upcoming Bootcamps. Time: Wednesdays 11 a.m....
Best Practices for Protecting High Valu...
OMB's Cybersecurity Strategy and Implementation Plan (CISP) underscores the need for agencies to implement a defense in depth strategy to protect their high value information and assets, especially sensitive data, sensitive keys, and identity credentials. Sensitive data-at-rest is generally the most vulnerable once a breach has occurred, because of its volume and relevance. Attackers far too often hijack privileged accounts with full access to...
Stop fraudsters without blocking good c...
Fraudsters can attack at the local, state and federal level – leaving everyone at risk. So arming yourself with the best tools isn’t just smart, it’s essential. Don’t miss your chance to learn about TransUnion solutions that help you quickly verify identities and detect patterns of online fraud.
April 25, 2016
Organizer:
TransUnion Location:
Virtual
NVTC CXO Auction
The NVTC CXO Auction is an exciting event during which regional and industry c-level executives will be auctioned off to raise money for NVTC's Veterans Employment Initiative, which provides tools and resources to match veterans with employment opportunities in Virginia's technology community. During the live auction event, attendees will bid electronically to win one-on-one meetings with c-level leaders. Participating CXOs are looking to meet...
Transform Your Organization with Hyper-...
VMware Hyper-Converged Infrastructure (HCI) is quickly transforming the way agencies build and manage their datacenter and IT infrastructure. New organizational requirements are encouraging many technology leaders of the future to embrace recent innovations in computing like VMware Hyper-Converged Software (HCS), now tightly integrated with EMC hardware, and available as a single appliance solution, VxRail. Agencies are rapidly investing in H...
Securing Government in an Interconnecte...
The push for innovation has made our world more interconnected than ever. IT advancements in cloud, IoT and mobility have forced interdependency among federal agencies and reliance on various outside vendors and contractors to enhance productivity and ensure efficiency. With innovation comes vulnerability, such as cyber breaches and compromised information - so how can federal agencies stay technologically progressive, but still remain secure?...
April 20, 2016
Organizer:
Forcepoint Location:
Webcast
Information Security and Compliance For...
Join QTS in Washington, D.C. for this year's Information Security and Compliance Forum (ISCF) to hear industry experts discuss the threats federal agencies and businesses face when securing data online. At this event, speakers will share their knowledge about how to best prevent, detect and respond to malicious and unintentional insider threats today and in the future.Register now for ISCF 2016 on Wednesday, April 20 at the The Willard Hotel a...
April 20, 2016
Organizer:
QTS Location:
Washington, DC
2016 Security Through Innovation Summit
SAVE THE DATE! The Security Through Innovation Summit will bring together top thought leaders and innovators from the Gov IT community to discuss the latest trends in public sector cybersecurity, including cloud deployments, zero day net defense, next generation endpoint security, and ID assurance. April 14, 2016 / 7:30 a.m. – 2:30 p.m.The Ritz-Carlton, Pentagon CityGovernment: FREEIndustry: $195
April 14, 2016
Organizer:
FedScoop Location:
Arlington, VA
Protecting the Front Line in Government...
According to IDC, over 75% of all transactions occur on business-critical applications, and the sensitive data from these systems is of great value to cyber-attackers. These systems are responsible for housing critical business processes and data, including financial and medical information about citizens, location of military assets, or sensitive personnel and clearance records. Indeed, IDC predicts that breaches will become more frequent and...
April 14, 2016
Organizer:
FEDINSIDER Location:
Webcast
Your Antidote to Ransomware - Dell Data...
We invite you to join this important webinar and learn how to PREVENT ransomware attacks BEFORE they are execued. Dell now offers revolutionary advanced threat prevention that offers 99% efficacy, far beyond the 50% average efficacy offered by anti-virus and other signature-based malware protection solutions.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.