Cloud Native Application Security - Lif...
Agencies have invested heavily in migrating applications to the cloud and creating cloud-native applications to serve the public. Securing these applications has emerged as a primary objective, particularly in incorporating them into a zero trust architecture. Strengthening app security focuses on integrating security measures throughout the application lifecycle – from development to deployment – by using cloud-native technologies...
January 14, 2025
Organizer:
FedInsider Location:
Webcast
Enhance Cyber Resilience with Continuou...
Government agencies face increasing cyber threats in today's interconnected world. As digital infrastructure becomes critical to global operations, robust cybersecurity is more important than ever. By leveraging data-driven insights, agencies can proactively identify vulnerabilities, detect threats early and respond effectively to cyberattacks. During this webinar, attendees will explore how to:Develop a data-driven approach to rapidly enhance...
Boost Your Revenue and Productivity wit...
We’re excited to invite you to an engaging session all about Power PDF, the leading solution for your PDF needs. Join us to explore how Power PDF is revolutionizing document management for organizations like yours. During this webinar, attendees will : Uncover the Evolution of Power PDF: Gain insight into its history and how satisfied customers are using it today.Experience the Advantages: Learn why customers and analysts love Power PDF,...
Learn How to Grow Your Federal Business...
Skyhigh Security continues initiatives to be a leader in public sector, with Skyhigh Secure Web Gateway (SWG) receiving recent FedRAMP High authorization. Many of your Federal customers are seeking to adopt cloud technologies to improve efficiency, support agility, and reduce costs. With Skyhigh Security’s recent SWG FedRAMP High authorization, you can solve their most critical security challenges by delivering Skyhigh SWG, part of the S...
VETS 2 DPA Training
Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
Maintenance Repair Facility Supplies (M...
Federal agencies now have a fast, effective, way to buy maintenance, repair, and facility (MRFS2) supplies and save! GSA’s dynamic MRFS2 purchasing channel solution can help you save an average of 8 percent more on MRFS2 products than previously offered in the federal marketplace. Log on for live webinar training to discover the benefits of GSA’s MRFS2 solution. Seize your opportunity to attend this short, in-depth webinar, for whi...
IPv6 Workshop Series: Achieving IPv6-On...
In this workshop session, the final of our three-part IPv6 series, HexaBuild’s Scott Hogg will provide an overview on how DNS64 and NAT64 can be used to facilitate IPv6-only end-nodes reaching IPv4-only services. Along with Infoblox’s Cricket Liu, they will review the architectural considerations for this solution and how to configure the DNS64 functionality in Infoblox. Key Learning Objectives:Discuss how the DNS64 address synthes...
OASIS+ Overview
Join us for an overview of the new OASIS+ contract program. This training will provide an overview of this new contract program, including contract structure, scope, features, ordering overview, comparison to other GSA contract programs, and resources. OASIS+ is a new government wide, multiple-award indefinite-delivery indefinite-quantity (MA-IDIQ) multi-agency contract (MAC) program designed to address government agencies' mission needs for c...
Cyber Resilience for the Defense ...
Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. By understanding the data—its location, accessibility, and how to res...
January 22, 2025
Organizer:
FedInsider Location:
Webcast
Resilient and Camouflaged Communication...
In high-stakes environments, secure and reliable communication can mean the difference between mission success and failure. Join Dominic Perez, CTO of Curtiss-Wright Defense Solutions and Timothy Hillner, CTO of Fairwinds Technologies, as they delve into advanced strategies for ensuring resilient communications for forward deployed teams. This webinar will explore innovative approaches to safeguard data and maintain connectivity, even in hosti...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.