Back to Search Begin New Search Save Search Auto-Notify
Proofpoint Tech Talk: Reduce Risk with...
With so many employees working remotely during these unprecedented times, a careless mistake or simple lack of caution could cost your organization millions of dollars in damages. Now more than ever before, there’s a stronger need to assess user behavior, determine its impact on risk, and put in place practical steps to prevent malicious attacks. Proofpoint Security Awareness Training addresses these challenges by helping you identify ri...
January 6, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
Cyber Defenders Assemble: AI, FedRAMP,...

CANCELED

Cyber Defenders Assemble: AI, FedRAMP, TIC, Zero Trust Federal IT’s mightiest cyber avengers must assemble to defend the cloud, protect IoT and endpoints, secure data from internal and external threats, and shield against advancing arch-nemesis. To defeat the next age of cyber supervillains, agencies need to establish new security functions and implement innovative programs to Hulk smash the threats lingering outside – and within ...
December 10, 2020
Organizer: Meritalk
Location: Webcast
Add Favorite
The DevSecOps Journey – Are We There Yet?
It’s fair to say that enlightened organizations buckled up and embarked on the DevSecOps journey some time ago. It hasn’t been an easy road, complete with many unexpected speed limits, roadblocks and detours. It would seem timely to pull out the map, pinpoint where we are, and look ahead to get a better idea of what exactly the destination looks like. To help us evaluate progress made thus far, ATARC, in collaboration with the U.S...
December 9, 2020
Organizer: ATARC
Location: Webcast
Add Favorite
Applying Zero Trust Security to Sensiti...
When it comes to building a robust security posture, firewalls and VPNs no longer cut it, especially in healthcare Internet of Things (IoT). Between the thousands of medical and other connected devices moving across healthcare ecosystems and the unquantifiable amount of interconnectivity between them, maintaining minimal levels of cyber hygiene has become increasingly complex for healthcare facilities.On top of that, medical devices often cann...
December 9, 2020
Organizer: Cynerio Government Team at Carahsoft
Location: Webcast
Add Favorite
Migrating to VMware on milCloud® 2.0
Moving an entire network to the cloud is challenging enough without worrying about re-architecting applications and workloads. On milCloud® 2.0, we built a native on-demand VMware environment to provide mission partners the power to accelerate their cloud migrations without conversion. Using this new technology, milCloud® 2.0 mission partners can empower digital workspaces, modernize their data centers, integrate clouds, and transform...
November 18, 2020
Organizer: Meritalk
Location: Webcast
Add Favorite
Actionable Intelligence for Maintenance...
The effectiveness of Maintenance Repair Operations (MRO) directly impacts DoD readiness and lethality. The orchestration of thousands of tasks and moving components around the globe is no small undertaking involving parts inventory, logistics, and installation activities carried out by our warfighters. The high complexity of the MRO function can be managed through implementing digital tools such as artificial intelligence and machine learning...
November 17, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Ransomware: Zero Trust and the Threat Inside
According to Verizon’s 2020 Data Breach Investigative Report, ransomware now represents 27% of all malware attacks. Over 30% of ransomware starts from within. That means that network defenders must consider the possibility that malicious employees could be the origin of an attack. Cyber criminals are stepping up their game by exploiting fear and uncertainty during the pandemic by launching a steadily increasing amount of cyberattacks. Re...
October 21, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
DevSecOps Easy Modern Secure Applications
Most security breaches occur in the application and not the system. The DevSecOps methodology diminishes security breaches early in the DevOps application lifecycle, but with that, there needs to be a centralized application security solution. The Fortify Security Suite offers various levels of application security that are a part of the CI/CD pipeline code delivery. Join Micro Focus Government Solutions on Wednesday, October 21, during Carah...
October 21, 2020
Organizer: Micro Focus Government Solutions
Location: Webcast
Add Favorite
Digital Healthcare: Safeguarding Patient Data
The COVID-19 pandemic has propelled telehealth into prominence, and telemedicine, once viewed as a convenience, is now an essential tool for treating patients. During the months of April and May of this year, telehealth increased nationally by more than 5,000% over last year. While telehealth is a necessary and beneficial solution during the COVID-19 crisis and beyond, its growing use can jeopardize the safety of sensitive patient data and the...
October 8, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Path Forward for IT Modernization in Go...
According to Gartner, moving applications to the cloud is a top priority (and one of the most often mentioned game-changing technologies) for government CIOs today. But obstacles – like lack of experience in cloud migration, security concerns, and policy hurdles – continue to impede agencies’ progress. The COVID-19 pandemic has magnified this issue considerably as agencies rely on their information technology infrastructure t...
August 11, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search